31 research outputs found

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Application and Development of Embedded Systems with IoT Components: Aspect of Safety and Reliability

    Get PDF
    We will present the possibilities of application and development, especially in the field of embedded systems, its interaction with other IoT components, the security aspects of individual components, as well as the domain of their interaction. In embedded systems, we will present new technologies such as fuzzy logic, application possibilities in embedded systems, and machine learning, as application possibilities through the implementation of machine learning. Then we will describe some more examples of the application of fuzzy logic, the automatic control of certain functions in cameras, as well as the defuzzification process, and the possibility of application in security cameras. In embedded systems, we will present the basic aspects of optimization and security, both in everyday applications and in interaction with other components of IoT technologies. The paper shows how security, reliability, and cost estimates affect the implementation phases and the final use of embedded systems, through examples of their application in industry. Security and data protection is shown through the construction of the mentioned devices, their application, but also different encryption methods, permissions, security devices at the network level, as well as implemented IoT technologies. Application examples are focused on the real segment, both in the field of transport, multimedia, design, and in the field of industrial application possibilities

    Radio Communications

    Get PDF
    In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modified our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the field of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks

    Development and Flight Testing of a Wireless Avionics Network Based on the IEEE 802.11 Protocols

    Get PDF
    This report describes the development and flight testing of the IEEE 802.11 protocol-based Wireless Flight Management System (WFMS) using low cost Commercial-Off-The-Shelf (COTS) equipment and software. The unlicensed spectrum allocation in the 2.4 GHz and 5 GHz bands by the FCC has encouraged the industry to develop new standards for short-range communication that are commercially viable. This has resulted in new short-range communication technologies like Bluetooth and the Wireless Local Area Network (WLAN). The new modulation techniques developed for wireless communication support wired equivalent data rates. The commercial success of these technologies and their wide market adaptation has resulted in reduced costs for the devices that support these technologies. Applications of wireless technology in aerospace engineering are vast, including development, testing, manufacturing, prognostics health management, ground support equipment and active control. The high data rates offered by technologies like WLAN (IEEE 802.11 a/b/g) are sufficient to implement critical and essential data applications of avionics systems. A wireless avionics network based on IEEE 802.11a/b/g protocols will reduce the complexity and cost of installation and maintenance of the avionics system when compared to the existing wired system. The proposed WFMS imitates the flight management system of any commercial aircraft in terms of functionality. It utilizes a radio frequency for the transmission of the sensor data to the Cockpit Display Unit (CDU) and the Flight Management Computer (FMC). WFMS consists of a FMC, data acquisition node, sensor node and a user interface node. The FMC and the data acquisition nodes are built using PC/104 standard modules. The sensor node consists of an Attitude and Heading Reference System (AHRS) and a GPS integrated with a serial device server. The user interface node is installed with moving map software which receives data from the AHRS and GPS to display flight information including topographic maps, attitude, heading, velocity, et cetera. This thesis demonstrates the performance evaluation of the WFMS both on the ground and in flight, and its advantages over a wired system. This thesis focuses on the evaluation of IEEE 802.11a/b/g protocols for avionics application. Efforts taken to calibrate the available bandwidth of the WLAN network at different operating conditions and varying ranges using different network analysis tools are explained briefly. Considerable research on issues like electromagnetic interference and network security critical to the development of a wireless network for avionics has also been done. This report covers different aspects of the implementation of wireless technology for aircraft systems. This work is a successful starting point for the new fly-by-wireless concept with extensions to active wireless flight control

    The effective combating of intrusion attacks through fuzzy logic and neural networks

    Get PDF
    The importance of properly securing an organization’s information and computing resources has become paramount in modern business. Since the advent of the Internet, securing this organizational information has become increasingly difficult. Organizations deploy many security mechanisms in the protection of their data, intrusion detection systems in particular have an increasingly valuable role to play, and as networks grow, administrators need better ways to monitor their systems. Currently, many intrusion detection systems lack the means to accurately monitor and report on wireless segments within the corporate network. This dissertation proposes an extension to the NeGPAIM model, known as NeGPAIM-W, which allows for the accurate detection of attacks originating on wireless network segments. The NeGPAIM-W model is able to detect both wired and wireless based attacks, and with the extensions to the original model mentioned previously, also provide for correlation of intrusion attacks sourced on both wired and wireless network segments. This provides for a holistic detection strategy for an organization. This has been accomplished with the use of Fuzzy logic and neural networks utilized in the detection of attacks. The model works on the assumption that each user has, and leaves, a unique footprint on a computer system. Thus, all intrusive behaviour on the system and networks which support it, can be traced back to the user account which was used to perform the intrusive behavior

    Radio Identity Verification-based IoT Security Using RF-DNA Fingerprints and SVM

    Get PDF
    It is estimated that the number of Internet of Things (IoT) devices will reach 75 billion in the next five years. Most of those currently and soon-to-be deployed devices lack sufficient security to protect themselves and their networks from attacks by malicious IoT devices masquerading as authorized devices in order to circumvent digital authentication approaches. This work presents a Physical (PHY) layer IoT authentication approach capable of addressing this critical security need through the use of feature-reduced, Radio Frequency-Distinct Native Attributes (RF-DNA) fingerprints and Support Vector Machines (SVM). This work successfully demonstrates (i) authorized Identity (ID) verification across three trials of six randomly chosen radios at signal-to-noise ratios greater than or equal to 6 dB and (ii) rejection of all rogue radio ID spoofing attacks at signal-to-noise ratios greater than or equal to 3 dB using RF-DNA fingerprints whose features are selected using the Relief-F algorithm

    AN ADAPTIVE INFORMATION DISSEMINATION MODEL FOR VANET COMMUNICATION

    Get PDF
    Vehicular ad hoc networks (VANETs) have been envisioned to be useful in road safety and many commercial applications. The growing trend to provide communication among the vehicles on the road has provided the opportunities for developing a variety of applications for VANET. The unique characteristics of VANET bring about new research challenges

    New Waves of IoT Technologies Research – Transcending Intelligence and Senses at the Edge to Create Multi Experience Environments

    Get PDF
    The next wave of Internet of Things (IoT) and Industrial Internet of Things (IIoT) brings new technological developments that incorporate radical advances in Artificial Intelligence (AI), edge computing processing, new sensing capabilities, more security protection and autonomous functions accelerating progress towards the ability for IoT systems to self-develop, self-maintain and self-optimise. The emergence of hyper autonomous IoT applications with enhanced sensing, distributed intelligence, edge processing and connectivity, combined with human augmentation, has the potential to power the transformation and optimisation of industrial sectors and to change the innovation landscape. This chapter is reviewing the most recent advances in the next wave of the IoT by looking not only at the technology enabling the IoT but also at the platforms and smart data aspects that will bring intelligence, sustainability, dependability, autonomy, and will support human-centric solutions.acceptedVersio

    A novel MAC Protocol for Cognitive Radio Networks

    Get PDF
    In Partial Fulfilment of the Requirements for the Degree Doctor of Philosophy from the University of BedfordshireThe scarcity of bandwidth in the radio spectrum has become more vital since the demand for wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum bands and the inefficiency in their utilization have been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting transmission characteristics. In this thesis, recent research and survey about the advances in theory and applications of cognitive radio technology has been reviewed. The thesis starts with the essential background on cognitive radio techniques and systems and discusses those characteristics of CR technology, such as standards, applications and challenges that all can help make software radio more personal. It then presents advanced level material by extensively reviewing the work done so far in the area of cognitive radio networks and more specifically in medium access control (MAC) protocol of CR. The list of references will be useful to both researchers and practitioners in this area. Also, it can be adopted as a graduate-level textbook for an advanced course on wireless communication networks. The development of new technologies such as Wi-Fi, cellular phones, Bluetooth, TV broadcasts and satellite has created immense demand for radio spectrum which is a limited natural resource ranging from 30KHz to 300GHz. For every wireless application, some portion of the radio spectrum needs to be purchased, and the Federal Communication Commission (FCC) allocates the spectrum for some fee for such services. This static allocation of the radio spectrum has led to various problems such as saturation in some bands, scarcity, and lack of radio resources to new wireless applications. Most of the frequencies in the radio spectrum have been allocated although many studies have shown that the allocated bands are not being used efficiently. The CR technology is one of the effective solutions to the shortage of spectrum and the inefficiency of its utilization. In this thesis, a detailed investigation on issues related to the protocol design for cognitive radio networks with particular emphasis on the MAC layer is presented. A novel Dynamic and Decentralized and Hybrid MAC (DDH-MAC) protocol that lies between the CR MAC protocol families of globally available common control channel (GCCC) and local control channel (non-GCCC). First, a multi-access channel MAC protocol, which integrates the best features of both GCCC and non-GCCC, is proposed. Second, an enhancement to the protocol is proposed by enabling it to access more than one control channel at the same time. The cognitive users/secondary users (SUs) always have access to one control channel and they can identify and exploit the vacant channels by dynamically switching across the different control channels. Third, rapid and efficient exchange of CR control information has been proposed to reduce delays due to the opportunistic nature of CR. We have calculated the pre-transmission time for CR and investigate how this time can have a significant effect on nodes holding a delay sensitive data. Fourth, an analytical model, including a Markov chain model, has been proposed. This analytical model will rigorously analyse the performance of our proposed DDH-MAC protocol in terms of aggregate throughput, access delay, and spectrum opportunities in both the saturated and non-saturated networks. Fifth, we develop a simulation model for the DDH-MAC protocol using OPNET Modeler and investigate its performance for queuing delays, bit error rates, backoff slots and throughput. It could be observed from both the numerical and simulation results that when compared with existing CR MAC protocols our proposed MAC protocol can significantly improve the spectrum utilization efficiency of wireless networks. Finally, we optimize the performance of our proposed MAC protocol by incorporating multi-level security and making it energy efficient
    corecore