46 research outputs found

    Wireless communication, sensing, and REM: A security perspective

    Get PDF
    The diverse requirements of next-generation communication systems necessitate awareness, flexibility, and intelligence as essential building blocks of future wireless networks. The awareness can be obtained from the radio signals in the environment using wireless sensing and radio environment mapping (REM) methods. This is, however, accompanied by threats such as eavesdropping, manipulation, and disruption posed by malicious attackers. To this end, this work analyzes the wireless sensing and radio environment awareness mechanisms, highlighting their vulnerabilities and provides solutions for mitigating them. As an example, the different threats to REM and its consequences in a vehicular communication scenario are described. Furthermore, the use of REM for securing communications is discussed and future directions regarding sensing/REM security are highlighted

    Radio Frequency Interference Impact Assessment on Global Navigation Satellite Systems

    Get PDF
    The Institute for the Protection and Security of the Citizen of the EC Joint Research Centre (IPSC-JRC) has been mandated to perform a study on the Radio Frequency (RF) threat against telecommunications and ICT control systems. This study is divided into two parts. The rst part concerns the assessment of high energy radio frequency (HERF) threats, where the focus is on the generation of electromagnetic pulses (EMP), the development of corresponding devices and the possible impact on ICT and power distribution systems. The second part of the study concerns radio frequency interference (RFI) with regard to global navigation satellite systems (GNSS). This document contributes to the second part and contains a detailed literature study disclosing the weaknesses of GNSS systems. Whereas the HERF analysis only concerns intentional interference issues, this study on GNSS also takes into account unintentional interference, enlarging the spectrum of plausible interference scenarios.JRC.DG.G.6-Security technology assessmen

    Security performance and protocol consideration in optical communication system with optical layer security enabled by optical coding techniques

    Get PDF
    With the fast development of communication systems, network security issues have more and more impact on daily life. It is essential to construct a high degree of optical layer security to resolve the security problem once and for all. Three different techniques which can provide optical layer security are introduced and compared. Optical chaos can be used for fast random number generation. Quantum cryptography is the most promising technique for key distribution. And the optical coding techniques can be deployed to encrypt the modulated signal in the optical layer. A mathematical equation has been derived from information theory to evaluate the information-theoretic security level of the wiretap channel in optical coding schemes. And the merits and limitation of two coherent optical coding schemes, temporal phase coding and spectral phase coding, have been analysed. The security scheme based on a reconfigurable optical coding device has been introduced, and the corresponding security protocol has been developed. By moving the encryption operation from the electronic layer to the optical layer, the modulated signals become opaque to the unauthorised users. Optical code distribution and authentication is the one of the major challenges for our proposed scheme. In our proposed protocol, both of the operations are covered and defined in detail. As a preliminary draft of the optical code security protocol, it could be a useful guidance for further research

    Position manipulation attacks to balise-based train automatic stop control

    Get PDF
    Singapore National Research Foundatio

    Advanced optical modulation and fast reconfigurable en/decoding techniques for OCDMA application

    Get PDF
    With the explosive growth of bandwidth requirement in optical fiber communication networks, optical code division multiple access (OCDMA) has witnessed tremendous achievements as one of the promising technologies for optical access networks over the past decades. In an OCDMA system, optical code processing is one of the key techniques. Rapid optical code reconfiguration can improve flexibility and security of the OCDMA system. This thesis focuses on advanced optical modulations and en/decoding techniques for applications in fast reconfigurable OCDMA systems and secure optical communications. A novel time domain spectral phase encoding (SPE) scheme which can rapidly reconfigure the optical code and is compatible with conventional spectral domain phase en/decoding by using a pair of dispersive devices and a high speed phase modulator is proposed. Based on this scheme, a novel advanced modulation technique that can simultaneously generate both the optical code and the differential-phase-shift-keying (DPSK) data using a single phase modulator is experimentally demonstrated. A symmetric time domain spectral phase encoding and decoding (SPE/SPD) scheme using a similar setup for both the transmitter and receiver is further proposed, based on which a bit-by-bit optical code scrambling and DPSK data modulation technique for secure optical communications has been successfully demonstrated. By combining optical encoding and optical steganography, a novel approach for secure transmission of time domain spectral phase encoded on-off-keying (OOK)/DPSK-OCDMA signal over public wavelength-division multiplexing (WDM) network has also been proposed and demonstrated. To enable high speed operation of the time domain SPE/SPD scheme and enhance the system security, a rapid programmable, code-length variable bit-by-bit optical code shifting technique is proposed. Based on this technique, security improvements for OOK/DPSK OCDMA systems at data rates of 10Gb/s and 40Gb/s using reconfigurable optical codes of up to 1024-chip have been achieved. Finally, a novel tunable two-dimensional coherent optical en/decoder which can simultaneously perform wavelength hopping and spectral phase encoding based on coupled micro-ring resonator is proposed and theoretically investigated. The techniques included in this thesis could be potentially used for future fast reconfigurable and secure optical code based communication systems

    Physical layer security for IoT applications

    Get PDF
    The increasing demands for Internet of things (IoT) applications and the tremendous increase in the volume of IoT generated data bring novel challenges for the fifth generation (5G) network. Verticals such as e-Health, vehicle to everything (V2X) and unmanned aerial vehicles (UAVs) require solutions that can guarantee low latency, energy efficiency,massive connectivity, and high reliability. In particular, finding strong security mechanisms that satisfy the above is of central importance for bringing the IoT to life. In this regards, employing physical layer security (PLS) methods could be greatly beneficial for IoT networks. While current security solutions rely on computational complexity, PLS is based on information theoretic proofs. By removing the need for computational power, PLS is ideally suited for resource constrained devices. In detail, PLS can ensure security using the inherit randomness already present in the physical channel. Promising schemes from the physical layer include physical unclonable functions (PUFs), which are seen as the hardware fingerprint of a device, and secret key generation (SKG) from wireless fading coefficients, which provide the wireless fingerprint of the communication channel between devices. The present thesis develops several PLS-based techniques that pave the way for a new breed of latency-aware, lightweight, security protocols. In particular, the work proposes: i) a fast multi-factor authentication solution with verified security properties based on PUFs, proximity detection and SKG; ii) an authenticated encryption SKG approach that interweaves data transmission and key generation; and, iii) a set of countermeasures to man-in-the-middle and jamming attacks. Overall, PLS solutions show promising performance, especially in the context of IoT applications, therefore, the advances in this thesis should be considered for beyond-5G networks

    Orthogonal multicarrier modulation for high-rates mobile and wireless communications

    Get PDF
    SIGLEAvailable from British Library Document Supply Centre-DSC:DXN037085 / BLDSC - British Library Document Supply CentreGBUnited Kingdo

    Unmanned Aerial Vehicle (UAV)-Enabled Wireless Communications and Networking

    Get PDF
    The emerging massive density of human-held and machine-type nodes implies larger traffic deviatiolns in the future than we are facing today. In the future, the network will be characterized by a high degree of flexibility, allowing it to adapt smoothly, autonomously, and efficiently to the quickly changing traffic demands both in time and space. This flexibility cannot be achieved when the network’s infrastructure remains static. To this end, the topic of UAVs (unmanned aerial vehicles) have enabled wireless communications, and networking has received increased attention. As mentioned above, the network must serve a massive density of nodes that can be either human-held (user devices) or machine-type nodes (sensors). If we wish to properly serve these nodes and optimize their data, a proper wireless connection is fundamental. This can be achieved by using UAV-enabled communication and networks. This Special Issue addresses the many existing issues that still exist to allow UAV-enabled wireless communications and networking to be properly rolled out
    corecore