3,059 research outputs found

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Secure key design approaches using entropy harvesting in wireless sensor network: A survey

    Get PDF
    Physical layer based security design in wireless sensor networks have gained much importance since the past decade. The various constraints associated with such networks coupled with other factors such as their deployment mainly in remote areas, nature of communication etc. are responsible for development of research works where the focus is secured key generation, extraction, and sharing. Keeping the importance of such works in mind, this survey is undertaken that provides a vivid description of the different mechanisms adopted for securely generating the key as well its randomness extraction and also sharing. This survey work not only concentrates on the more common methods, like received signal strength based but also goes on to describe other uncommon strategies such as accelerometer based. We first discuss the three fundamental steps viz. randomness extraction, key generation and sharing and their importance in physical layer based security design. We then review existing secure key generation, extraction, and sharing mechanisms and also discuss their pros and cons. In addition, we present a comprehensive comparative study of the recent advancements in secure key generation, sharing, and randomness extraction approaches on the basis of adversary, secret bit generation rate, energy efficiency etc. Finally, the survey wraps up with some promising future research directions in this area

    Robotic Wireless Sensor Networks

    Full text link
    In this chapter, we present a literature survey of an emerging, cutting-edge, and multi-disciplinary field of research at the intersection of Robotics and Wireless Sensor Networks (WSN) which we refer to as Robotic Wireless Sensor Networks (RWSN). We define a RWSN as an autonomous networked multi-robot system that aims to achieve certain sensing goals while meeting and maintaining certain communication performance requirements, through cooperative control, learning and adaptation. While both of the component areas, i.e., Robotics and WSN, are very well-known and well-explored, there exist a whole set of new opportunities and research directions at the intersection of these two fields which are relatively or even completely unexplored. One such example would be the use of a set of robotic routers to set up a temporary communication path between a sender and a receiver that uses the controlled mobility to the advantage of packet routing. We find that there exist only a limited number of articles to be directly categorized as RWSN related works whereas there exist a range of articles in the robotics and the WSN literature that are also relevant to this new field of research. To connect the dots, we first identify the core problems and research trends related to RWSN such as connectivity, localization, routing, and robust flow of information. Next, we classify the existing research on RWSN as well as the relevant state-of-the-arts from robotics and WSN community according to the problems and trends identified in the first step. Lastly, we analyze what is missing in the existing literature, and identify topics that require more research attention in the future

    Estimating the Number of Active Devices Within a Fixed Area Using Wi-Fi Monitoring

    Get PDF
    In various situations, there is a need to estimate the number of active Wi-Fi enabled devices, like smartphones, within a specific area. This thesis offers one possible approach to accomplish this task. It focuses on estimating the number of devices in a certain area based on monitoring and processing Wi-Fi metadata, which includes a received signal strength indicator. To accomplish this goal, four sensing devices are placed at the corners of a rectangular area. These sensing devices observe and record local data traffic, along with the received signal strength associated with each packet. For each sensing device, two types of frontends are considered, namely directional and isotropic antennas. Each sensing device retrieves the received signal strength indicators and the media access control addresses from the 802.11 frames packets transmitted by nearby active wireless devices. The estimator takes the received signal strength indicators as input and infers the number of active Wi-Fi devices inside the area of interest. Two algorithms, bayesian and maximum-likelihood, are employed for estimation purposes. Overall performance is used to compare and contrast the systems implemented with directional antennas and isotropic antennas, respectively. Theoretical and experimental results both hint at performance improvements when using directional antennas, when compared to standard isotropic antennas

    IRS-assisted UAV Communications: A Comprehensive Review

    Full text link
    Intelligent reflecting surface (IRS) can smartly adjust the wavefronts in terms of phase, frequency, amplitude and polarization via passive reflections and without any need of radio frequency (RF) chains. It is envisaged as an emerging technology which can change wireless communication to improve both energy and spectrum efficiencies with low energy consumption and low cost. It can intelligently configure the wireless channels through a massive number of cost effective passive reflecting elements to improve the system performance. Similarly, unmanned aerial vehicle (UAV) communication has gained a viable attention due to flexible deployment, high mobility and ease of integration with several technologies. However, UAV communication is prone to security issues and obstructions in real-time applications. Recently, it is foreseen that UAV and IRS both can integrate together to attain unparalleled capabilities in difficult scenarios. Both technologies can ensure improved performance through proactively altering the wireless propagation using smart signal reflections and maneuver control in three dimensional (3D) space. IRS can be integrated in both aerial and terrene environments to reap the benefits of smart reflections. This study briefly discusses UAV communication, IRS and focuses on IRS-assisted UAC communications. It surveys the existing literature on this emerging research topic and highlights several promising technologies which can be implemented in IRS-assisted UAV communication. This study also presents several application scenarios and open research challenges. This study goes one step further to elaborate research opportunities to design and optimize wireless systems with low energy footprint and at low cost. Finally, we shed some light on future research aspects for IRS-assisted UAV communication

    Intelligent-Reflecting-Surface-Assisted UAV Communications for 6G Networks

    Full text link
    In 6th-Generation (6G) mobile networks, Intelligent Reflective Surfaces (IRSs) and Unmanned Aerial Vehicles (UAVs) have emerged as promising technologies to address the coverage difficulties and resource constraints faced by terrestrial networks. UAVs, with their mobility and low costs, offer diverse connectivity options for mobile users and a novel deployment paradigm for 6G networks. However, the limited battery capacity of UAVs, dynamic and unpredictable channel environments, and communication resource constraints result in poor performance of traditional UAV-based networks. IRSs can not only reconstruct the wireless environment in a unique way, but also achieve wireless network relay in a cost-effective manner. Hence, it receives significant attention as a promising solution to solve the above challenges. In this article, we conduct a comprehensive survey on IRS-assisted UAV communications for 6G networks. First, primary issues, key technologies, and application scenarios of IRS-assisted UAV communications for 6G networks are introduced. Then, we put forward specific solutions to the issues of IRS-assisted UAV communications. Finally, we discuss some open issues and future research directions to guide researchers in related fields
    • …
    corecore