1,047 research outputs found

    Context-based Pseudonym Changing Scheme for Vehicular Adhoc Networks

    Get PDF
    Vehicular adhoc networks allow vehicles to share their information for safety and traffic efficiency. However, sharing information may threaten the driver privacy because it includes spatiotemporal information and is broadcast publicly and periodically. In this paper, we propose a context-adaptive pseudonym changing scheme which lets a vehicle decide autonomously when to change its pseudonym and how long it should remain silent to ensure unlinkability. This scheme adapts dynamically based on the density of the surrounding traffic and the user privacy preferences. We employ a multi-target tracking algorithm to measure privacy in terms of traceability in realistic vehicle traces. We use Monte Carlo analysis to estimate the quality of service (QoS) of a forward collision warning application when vehicles apply this scheme. According to the experimental results, the proposed scheme provides a better compromise between traceability and QoS than a random silent period scheme.Comment: Extended version of a previous paper "K. Emara, W. Woerndl, and J. Schlichter, "Poster: Context-Adaptive User-Centric Privacy Scheme for VANET," in Proceedings of the 11th EAI International Conference on Security and Privacy in Communication Networks, SecureComm'15. Dallas, TX, USA: Springer, June 2015.

    A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network

    Full text link
    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.Comment: 14 pages, 7 figures, 2 table

    Assessment Instrument for Privacy Policy Content: Design and Evaluation of PPC

    Get PDF
    Privacy policies are notices posted by providers and intended to inform users about privacy practices. However, extant research shows that privacy policies are often of poor quality and do not address users’ concerns. In this paper, we design and develop PPC – a privacy policy content assessment instrument to support assessments of whether offered privacy policy content provides comprehensive information addressing users’ privacy concerns. PPC is developed based on extant research, standards, and guidelines. Application of PPC to 62 privacy policies of mHealth apps available in iOS and Android demonstrates utility of PPC and suitability of PPC as assessment instrument for privacy policy content. Contributions of our research are twofold: For research, we conduct improvement design science research contributing to design theory on assessment of privacy policy content. For practice, potential applications of PPC are support in privacy policy development and identification of deficiencies in offered privacy policies. In addition, through evaluation of PPC, we reveal an insufficient current state of mHealth app privacy policy content

    Experimental Evaluation of Wireless Mesh Networks: A Case Study and Comparison

    Get PDF
    Price of WiFi devices has decreased dramatically in recent years, while new standards, as 802.11n, have multiplied its performance. This has fostered the deployment of Wireless Mesh networks (WMN), putting into practice concepts evolved from more than a decade of research in Ad Hoc networks. Nevertheless, evolution of WMN it is in its infancy, as shows the growing and diverse number of scenarios where WMN are being deployed. In these paper we analyze a particular case study of a Wireless Community Mesh Network, and we compare it with a selected experimental WMN studies found in the literature

    Dynamic key ring update mechanism for mobile wireless sensor networks

    Get PDF
    Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs). Many of the key pre-distribution schemes proposed for static WSNs perform poorly when they are applied to Mobile Wireless Sensor Networks (MWSNs). In this paper, we propose Dynamic Key Ring Update (DKRU) mechanism for MWSNs. The aim of DKRU mechanism is to enable sensor nodes to update their key rings periodically during movement, by observing the frequent keys in their neighbors. Our mechanism can be used together with different key pre-distribution schemes and it helps to increase the performance of them. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme. Our results show that DKRU mechanism increases the local and global connectivity when it is applied to MWSNs. Moreover, our mechanism does not cause a significant degradation in network resiliency

    Factors Impacting Key Management Effectiveness in Secured Wireless Networks

    Get PDF
    The use of a Public Key Infrastructure (PKI) offers a cryptographic solution that can overcome many, but not all, of the MANET security problems. One of the most critical aspects of a PKI system is how well it implements Key Management. Key Management deals with key generation, key storage, key distribution, key updating, key revocation, and certificate service in accordance with security policies over the lifecycle of the cryptography. The approach supported by traditional PKI works well in fixed wired networks, but it may not appropriate for MANET due to the lack of fixed infrastructure to support the PKI. This research seeks to identify best practices in securing networks which may be applied to new network architectures

    Names, addresses and identities in ambient networks

    Get PDF
    Ambient Networks interconnect independent realms that may use different local network technologies and may belong to different administrative or legal entities. At the core of these advanced internetworking concepts is a flexible naming architecture based on dynamic indirections between names, addresses and identities. This paper gives an overview of the connectivity abstractions of Ambient Networks and then describes its naming architecture in detail, comparing and contrasting them to other related next-generation network architectures

    The Impact of Transmission Range Over Node Density in Vehicular Ad Hoc Network (Vanet) With Obstruction of Road Infrastructure

    Get PDF
    Vehicular ad hoc networks have the characteristic to of experiencing rapid change of network topology and mobility. Importantly, vehicular networks are required to deal with different network densities in order to provide efficient routing and data dissemination. These are some of the main characteristic that can affect the performance of the network immensely. The main issue that became the driving factor in implementing this project is the need to fill these gaps of understanding the behavioral of vehicular network performance when they are restrained by certain network condition which in this case, dealing with an obstruction of road infrastructure with varying transmission range and node density. In order to understand this problem, we identify the objectives of this project to integrate SUMO/MOVE (a vehicular traffic generator) into NS-2 to simulate a realistic vehicular ad hoc network environment and to study the performance of the network when the being conditioned into varying settings of transmission range and node density. In this project, we evaluate the network performance of VANETs in a highway environment using SUMO traffic simulator and network simulator, NS-2 which specifically focusing at the toll booths by studying the effect of varying transmission range over node density. From the simulation results, we found out that the smaller transmission range will produce less throughput, higher end to end delay and also higher normalized routing load. Particularly in vehicular ad hoc network, a constant or a fixed transmission range is not efficient enough in maintaining the connectivity in the network. This is due to the unpredictable of traffic conditions in the network. In addition to this, by dynamically changing the transmission range according to its need, will offer the advantage of power saving and increase capacity
    • …
    corecore