934 research outputs found
Alibi framework for identifying reactive jamming nodes in wireless LAN
Reactive jamming nodes are the nodes of the network that get compromised and become the source of jamming attacks. They assume to know any shared secrets and protocols used in the networks. Thus, they can jam very effectively and are very stealthy. We propose a novel approach to identifying the reactive jamming nodes in wireless LAN (WLAN). We rely on the half-duplex nature of nodes: they cannot transmit and receive at the same time. Thus, if a compromised node jams a packet, it cannot guess the content of the jammed packet. More importantly, if an honest node receives a jammed packet, it can prove that it cannot be the one jamming the packet by showing the content of the packet. Such proofs of jammed packets are called "alibis" - the key concept of our approach.
In this paper, we present an alibi framework to deal with reactive jamming nodes in WLAN. We propose a concept of alibi-safe topologies on which our proposed identification algorithms are proved to correctly identify the attackers. We further propose a realistic protocol to implement the identification algorithm. The protocol includes a BBC-based timing channel for information exchange under the jamming situation and a similarity hashing technique to reduce the storage and network overhead. The framework is evaluated in a realistic TOSSIM simulation where the simulation characteristics and parameters are based on real traces on our small-scale MICAz test-bed. The results show that in reasonable dense networks, the alibi framework can accurately identify both non-colluding and colluding reactive jamming nodes. Therefore, the alibi approach is a very promising approach to deal with reactive jamming nodes.published or submitted for publicationnot peer reviewe
Reliable Energy-Efficient Routing Algorithm for Vehicle-Assisted Wireless Ad-Hoc Networks
We investigate the design of the optimal routing path in a moving vehicles
involved the internet of things (IoT). In our model, jammers exist that may
interfere with the information exchange between wireless nodes, leading to
worsened quality of service (QoS) in communications. In addition, the transmit
power of each battery-equipped node is constrained to save energy. We propose a
three-step optimal routing path algorithm for reliable and energy-efficient
communications. Moreover, results show that with the assistance of moving
vehicles, the total energy consumed can be reduced to a large extend. We also
study the impact on the optimal routing path design and energy consumption
which is caused by path loss, maximum transmit power constrain, QoS
requirement, etc.Comment: 6 pages, 5 figures, rejected by IEEE Globecom 2017,resubmit to IEEE
WCNC 201
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
On The Security And Quality Of Wireless Communications In Outdoor Mobile Environment
The rapid advancement in wireless technology along with their low cost and ease of deployment have been attracting researchers academically and commercially. Researchers from private and public sectors are investing into enhancing the reliability, robustness, and security of radio frequency (RF) communications to accommodate the demand and enhance lifestyle. RF base communications -by nature- are slower and more exposed to attacks than a wired base (LAN). Deploying such networks in various cutting-edge mobile platforms (e.g. VANET, IoT, Autonomous robots) adds new challenges that impact the quality directly. Moreover, adopting such networks in public outdoor areas make them vulnerable to various attacks (regardless of the attacker motive). Therefore, the quality and security of the communications cannot be neglected especially when developing outdoor wireless applications/networks.
While some wireless applications and platforms aim to provide comfort and infotainment, others are more critical to protect and save lives. Thus, the need for mobile broadband connections has been increased to accommodate such applications. The FCC took the first step to regulate and assure the quality when using these technologies by allocating spectrums and issuing standards and amendments (e.g. IEEE802.11a, b, g, n, and p) to deliver reliable and secure communications.
In this dissertation, we introduce several problems related to the security and quality of communications in outdoor environments. Although we focus on the ISM-RF bands UHF and SHF (licensed and unlicensed) and their applications when solving quality and security issues nevertheless, the concept of propagating signals through the air for communications remain the same across other ISM bands. Therefore, problems and their solutions in this work can be applied to different wireless technologies with respect to environment and mobility
- …