638 research outputs found

    The Role of Physical Layer Security in IoT: A Novel Perspective

    Get PDF
    This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard). As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems

    Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments

    Get PDF
    Decentralized systems are a subset of distributed systems where multiple authorities control different components and no authority is fully trusted by all. This implies that any component in a decentralized system is potentially adversarial. We revise fifteen years of research on decentralization and privacy, and provide an overview of key systems, as well as key insights for designers of future systems. We show that decentralized designs can enhance privacy, integrity, and availability but also require careful trade-offs in terms of system complexity, properties provided, and degree of decentralization. These trade-offs need to be understood and navigated by designers. We argue that a combination of insights from cryptography, distributed systems, and mechanism design, aligned with the development of adequate incentives, are necessary to build scalable and successful privacy-preserving decentralized systems

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Physical Layer Security of Short Packet Communications

    Get PDF
    This dissertation aims to conduct research on security issues of 5G wireless networks, which are vulnerable to external security threats while supporting services for a massive number of users and devices. In practical wireless communication systems, the communication is subject to overhearing by external eavesdroppers due to the broadcast nature of the wireless medium. Physical layer security (PLS) shows promise as a viable option for securing future communication systems because it utilizes channel characteristics to hide transmitted messages from possible adversaries without depending on traditional cryptographic solutions. However, 5G systems are expected to support various traffic types, including short packet transmission, which results in new challenges in terms of security. Particularly, short packet transmission introduces a penalty on the secrecy capacity, which is the rate of secure communication between authorized parties in the presence of an adversary. It is well-known that PLS is based on the assumption that transmission happens with a maximum rate reliably and securely when the blocklengths are sufficiently large. In the literature, limited studies focus on PLS for short packet communications (SPC) and the performance analysis of secure SPC remains an open problem. Our goal is to study large-scale networks, but first, as a simple case, secure communication of a wiretap channel under the attack of an active eavesdropper, with two capabilities, namely half-duplex and full-duplex, is investigated. It appears that an active eavesdropper is more harmful to the secrecy throughput than a passive one, and the full-duplex eavesdropper (Eve) is more dangerous than a half-duplex Eve. Indeed, the performance is measured in terms of average secrecy throughput and theoretical approximations are validated through Monte Carlo simulations throughout all the contributions of the dissertation. Second, the wiretap channel model with multiple passive eavesdroppers is explored to shed light on a more realistic scenario in large-scale wireless networks. Although an increased number of antennas can lead to higher average secrecy throughput, achieving higher secrecy throughput is more effectively accomplished by increasing the transmission rates. As a final contribution, the previous wiretap channel setting is extended by adding multiple receivers. The security performance against colluding and non-colluding attackers is thoroughly examined. According to our results, it is more advantageous for eavesdroppers to collude and they are more powerful when their number increases. And we conclude the dissertation with a discussion of future work

    Behavioral Mimicry Covert Communication

    Get PDF
    Covert communication refers to the process of communicating data through a channel that is neither designed, nor intended to transfer information. Traditionally, covert channels are considered as security threats in computer systems and a great deal of attention has been given to countermeasures for covert communication schemes. The evolution of computer networks led the communication community to revisit the concept of covert communication not only as a security threat but also as an alternative way of providing security and privacy to communication networks. In fact, the heterogeneous structure of computer networks and the diversity of communication protocols provide an appealing setting for covert channels. This dissertation is an exploration on a novel design methodology for undetectable and robust covert channels in communication networks. Our new design methodology is based on the concept of behavioral mimicry in computer systems. The objective is to design a covert transmitter that has enough degrees of freedom to behave like an ordinary transmitter and react normally to unpredictable network events, yet it has the ability to modulate a covert message over its behavioral fingerprints in the network. To this end, we argue that the inherent randomness in communication protocols and network environments is the key in finding the proper medium for network covert channels. We present a few examples on how random behaviors in communication protocols lead to discovery of suitable shared resources for covert channels. The proposed design methodology is tested on two new covert communication schemes, one is designed for wireless networks and the other one is optimized for public communication networks (e.g., Internet). Each design is accompanied by a comprehensive analysis from undetectability, achievable covert rate and reliability perspectives. In particular, we introduced turbo covert channels, a family of extremely robust model-based timing covert channels that achieve provable polynomial undetectability in public communication networks. This means that the covert channel is undetectable against any polynomial-time statistical test that analyzes samples of the covert traffic and the legitimate traffic of the network. Target applications for the proposed covert communication schemes are discussed including detailed practical scenarios in which the proposed channels can be implemented
    • …
    corecore