3,878 research outputs found
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms
The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different areassuch as seamless platform integration, context based cognitive network integration,new mobile sensor/actuator network paradigms, things identification(addressing, naming in IoT) and dynamic things discoverability and manyothers. The IoRT represents new convergence challenges and their need to be addressed, in one side the programmability and the communication ofmultiple heterogeneous mobile/autonomous/robotic things for cooperating,their coordination, configuration, exchange of information, security, safetyand protection. Developments in IoT heterogeneous parallel processing/communication and dynamic systems based on parallelism and concurrencyrequire new ideas for integrating the intelligent “devices”, collaborativerobots (COBOTS), into IoT applications. Dynamic maintainability, selfhealing,self-repair of resources, changing resource state, (re-) configurationand context based IoT systems for service implementation and integrationwith IoT network service composition are of paramount importance whennew “cognitive devices” are becoming active participants in IoT applications.This chapter aims to be an overview of the IoRT concept, technologies,architectures and applications and to provide a comprehensive coverage offuture challenges, developments and applications
Recommended from our members
Controlling the handover mechanism in wireless mobile nodes using game theory
This paper proposes a novel network selection mechanism as an extension
to the FMIPv6 [2] protocol, which improves handover latency in the MIPv6 [1] in
the case where the Mobile Nodes (MN) have a single wireless interface with multiple
Care-of-Addresses (CoA’s). Moreover, this paper proposes a novel interface/network
selection mechanism, which is an extension to the MFMIPv6 [5], which work when
the mobile node has more than one wireless interface. Generally, the previous access
router (PAR) in the FMIPv6 protocol forwards all the arrived packets to the new
access router (NAR) by setting up a tunnel to it in order to prevent packet losses
incurred by latency during handover procedure. However, there is no protocol which
offers the user and/or the application to dynamically choose the right NAR (i.e. the
one offers a better service). What’s more, one of the main objectives of the next
generation networks will be heterogeneity in the wireless access environment in
which a mobile terminal will be able to connect to multiple radio networks
simultaneously. For these reasons, network selection and efficient load balancing
mechanisms among different networks will be required to achieve high-speed
connectivity with seamless mobility. To this end; Game Theory [3], naturally
becomes a useful and powerful tool to research this kind of problems. Game theory
is a mathematical tool developed to understand competitive situations in which
rational decision makers interact to achieve their objectives. The mechanism
improves the handover latency, the user ability to choose the right interface/network
and controls when to force the MN to make the handover
- …