169 research outputs found
Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the
spectrum sensing data falsification (SSDF) attack in the literature, is one of
the key adversaries to the success of cognitive radio networks (CRNs). In the
past couple of years, the research on the Byzantine attack and defense
strategies has gained worldwide increasing attention. In this paper, we provide
a comprehensive survey and tutorial on the recent advances in the Byzantine
attack and defense for CSS in CRNs. Specifically, we first briefly present the
preliminaries of CSS for general readers, including signal detection
techniques, hypothesis testing, and data fusion. Second, we analyze the spear
and shield relation between Byzantine attack and defense from three aspects:
the vulnerability of CSS to attack, the obstacles in CSS to defense, and the
games between attack and defense. Then, we propose a taxonomy of the existing
Byzantine attack behaviors and elaborate on the corresponding attack
parameters, which determine where, who, how, and when to launch attacks. Next,
from the perspectives of homogeneous or heterogeneous scenarios, we classify
the existing defense algorithms, and provide an in-depth tutorial on the
state-of-the-art Byzantine defense schemes, commonly known as robust or secure
CSS in the literature. Furthermore, we highlight the unsolved research
challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral
Secure Federated Learning for Cognitive Radio Sensing
This paper considers reliable and secure Spectrum Sensing (SS) based on
Federated Learning (FL) in the Cognitive Radio (CR) environment. Motivation,
architectures, and algorithms of FL in SS are discussed. Security and privacy
threats on these algorithms are overviewed, along with possible countermeasures
to such attacks. Some illustrative examples are also provided, with design
recommendations for FL-based SS in future CRs.Comment: 7 pages, 6 figure
Network Science for IoT
The research work presented in this thesis is based on the concept and defintion of network that can spread in several and different real world contexts. Indeed, we can refer to a network in a telecommunications sense considering a collection of transmitters, receivers, and communication channels that send or are used to send information to one another. However, as a matter of fact, in nature there are other several examples of networks: the human brain is one of them. The relationship between the actors in Hollywood can be studied in terms of network as well, a generic social community can be compared to a network, eco-systems are networks of species. The recent Network Science aims at studying all these systems using a set of common mathematical methods. In the following of the thesis, we will focus on some of well known telecommunications networks issues using standard telecommunications procedures to address them, with relevant reference to video flow transmissions and management of electric vehicles networks. At the same time, different models aiming at reach the same goals in contexts that may differ from a telecommunications setup can be used. In more details, we will evaluate queueing systems, jamming problems, groups recognition in networks, and mobile computing using game theoretic approaches. It is worth noting that this aspect can be also seen in a reverse order. Indeed, we will discuss how standard telecommunications analysis can be used to investigate on problems not directly related to a telecommunications background. In particular, one of our future purposes is to investigate on the brain connectivity that is raising significant interest in the recent scientific society
Cognitive Radio Systems
Cognitive radio is a hot research area for future wireless communications in the recent years. In order to increase the spectrum utilization, cognitive radio makes it possible for unlicensed users to access the spectrum unoccupied by licensed users. Cognitive radio let the equipments more intelligent to communicate with each other in a spectrum-aware manner and provide a new approach for the co-existence of multiple wireless systems. The goal of this book is to provide highlights of the current research topics in the field of cognitive radio systems. The book consists of 17 chapters, addressing various problems in cognitive radio systems
Game Theory for Multi-Access Edge Computing:Survey, Use Cases, and Future Trends
Game theory (GT) has been used with significant success to formulate, and either design or optimize, the operation of many representative communications and networking scenarios. The games in these scenarios involve, as usual, diverse players with conflicting goals. This paper primarily surveys the literature that has applied theoretical games to wireless networks, emphasizing use cases of upcoming multiaccess edge computing (MEC). MEC is relatively new and offers cloud services at the network periphery, aiming to reduce service latency backhaul load, and enhance relevant operational aspects such as quality of experience or security. Our presentation of GT is focused on the major challenges imposed by MEC services over the wireless resources. The survey is divided into classical and evolutionary games. Then, our discussion proceeds to more specific aspects which have a considerable impact on the game's usefulness, namely, rational versus evolving strategies, cooperation among players, available game information, the way the game is played (single turn, repeated), the game's model evaluation, and how the model results can be applied for both optimizing resource-constrained resources and balancing diverse tradeoffs in real edge networking scenarios. Finally, we reflect on lessons learned, highlighting future trends and research directions for applying theoretical model games in upcoming MEC services, considering both network design issues and usage scenarios
Cyber Law and Espionage Law as Communicating Vessels
Professor Lubin\u27s contribution is Cyber Law and Espionage Law as Communicating Vessels, pp. 203-225.
Existing legal literature would have us assume that espionage operations and “below-the-threshold” cyber operations are doctrinally distinct. Whereas one is subject to the scant, amorphous, and under-developed legal framework of espionage law, the other is subject to an emerging, ever-evolving body of legal rules, known cumulatively as cyber law. This dichotomy, however, is erroneous and misleading. In practice, espionage and cyber law function as communicating vessels, and so are better conceived as two elements of a complex system, Information Warfare (IW). This paper therefore first draws attention to the similarities between the practices – the fact that the actors, technologies, and targets are interchangeable, as are the knee-jerk legal reactions of the international community. In light of the convergence between peacetime Low-Intensity Cyber Operations (LICOs) and peacetime Espionage Operations (EOs) the two should be subjected to a single regulatory framework, one which recognizes the role intelligence plays in our public world order and which adopts a contextual and consequential method of inquiry. The paper proceeds in the following order: Part 2 provides a descriptive account of the unique symbiotic relationship between espionage and cyber law, and further explains the reasons for this dynamic. Part 3 places the discussion surrounding this relationship within the broader discourse on IW, making the claim that the convergence between EOs and LICOs, as described in Part 2, could further be explained by an even larger convergence across all the various elements of the informational environment. Parts 2 and 3 then serve as the backdrop for Part 4, which details the attempt of the drafters of the Tallinn Manual 2.0 to compartmentalize espionage law and cyber law, and the deficits of their approach. The paper concludes by proposing an alternative holistic understanding of espionage law, grounded in general principles of law, which is more practically transferable to the cyber realmhttps://www.repository.law.indiana.edu/facbooks/1220/thumbnail.jp
CLASSIFYING AND RESPONDING TO NETWORK INTRUSIONS
Intrusion detection systems (IDS) have been widely adopted within the IT community, as
passive monitoring tools that report security related problems to system administrators.
However, the increasing number and evolving complexity of attacks, along with the
growth and complexity of networking infrastructures, has led to overwhelming numbers of
IDS alerts, which allow significantly smaller timeframe for a human to respond. The need
for automated response is therefore very much evident. However, the adoption of such
approaches has been constrained by practical limitations and administrators' consequent
mistrust of systems' abilities to issue appropriate responses.
The thesis presents a thorough analysis of the problem of intrusions, and identifies false
alarms as the main obstacle to the adoption of automated response. A critical examination
of existing automated response systems is provided, along with a discussion of why a new
solution is needed. The thesis determines that, while the detection capabilities remain
imperfect, the problem of false alarms cannot be eliminated. Automated response
technology must take this into account, and instead focus upon avoiding the disruption of
legitimate users and services in such scenarios. The overall aim of the research has
therefore been to enhance the automated response process, by considering the context of an
attack, and investigate and evaluate a means of making intelligent response decisions.
The realisation of this objective has included the formulation of a response-oriented
taxonomy of intrusions, which is used as a basis to systematically study intrusions and
understand the threats detected by an IDS. From this foundation, a novel Flexible
Automated and Intelligent Responder (FAIR) architecture has been designed, as the basis
from which flexible and escalating levels of response are offered, according to the context
of an attack. The thesis describes the design and operation of the architecture, focusing
upon the contextual factors influencing the response process, and the way they are
measured and assessed to formulate response decisions. The architecture is underpinned by
the use of response policies which provide a means to reflect the changing needs and
characteristics of organisations.
The main concepts of the new architecture were validated via a proof-of-concept prototype
system. A series of test scenarios were used to demonstrate how the context of an attack
can influence the response decisions, and how the response policies can be customised and
used to enable intelligent decisions. This helped to prove that the concept of flexible
automated response is indeed viable, and that the research has provided a suitable
contribution to knowledge in this important domain
Interference charecterisation, location and bandwidth estimation in emerging WiFi networks
Wireless LAN technology based on the IEEE 802.11 standard, commonly referred
to as WiFi, has been hugely successful not only for the last hop access to the Internet
in home, office and hotspot scenarios but also for realising wireless backhaul in mesh
networks and for point -to -point long- distance wireless communication. This success
can be mainly attributed to two reasons: low cost of 802.11 hardware from reaching
economies of scale, and operation in the unlicensed bands of wireless spectrum.The popularity of WiFi, in particular for indoor wireless access at homes and offices,
has led to significant amount of research effort looking at the performance issues
arising from various factors, including interference, CSMA/CA based MAC protocol
used by 802.11 devices, the impact of link and physical layer overheads on application
performance, and spatio-temporal channel variations. These factors affect the performance
of applications and services that run over WiFi networks. In this thesis, we
experimentally investigate the effects of some of the above mentioned factors in the
context of emerging WiFi network scenarios such as multi- interface indoor mesh networks,
802.11n -based WiFi networks and WiFi networks with virtual access points
(VAPs). More specifically, this thesis comprises of four experimental characterisation
studies: (i) measure prevalence and severity of co- channel interference in urban WiFi
deployments; (ii) characterise interference in multi- interface indoor mesh networks;
(iii) study the effect of spatio-temporal channel variations, VAPs and multi -band operation
on WiFi fingerprinting based location estimation; and (iv) study the effects of
newly introduced features in 802.11n like frame aggregation (FA) on available bandwidth
estimation.With growing density of WiFi deployments especially in urban areas, co- channel
interference becomes a major factor that adversely affects network performance. To
characterise the nature of this phenomena at a city scale, we propose using a new measurement
methodology called mobile crowdsensing. The idea is to leverage commodity
smartphones and the natural mobility of people to characterise urban WiFi co- channel
interference. Specifically, we report measurement results obtained for Edinburgh, a
representative European city, on detecting the presence of deployed WiFi APs via the
mobile crowdsensing approach. These show that few channels in 2.4GHz are heavily
used and there is hardly any activity in the 5GHz band even though relatively it
has a greater number of available channels. Spatial analysis of spectrum usage reveals
that co- channel interference among nearby APs operating in the same channel
can be a serious problem with around 10 APs contending with each other in many locations. We find that the characteristics of WiFi deployments at city -scale are similar
to those of WiFi deployments in public spaces of different indoor environments. We
validate our approach in comparison with wardriving, and also show that our findings
generally match with previous studies based on other measurement approaches. As
an application of the mobile crowdsensing based urban WiFi monitoring, we outline a
cloud based WiFi router configuration service for better interference management with
global awareness in urban areas.For mesh networks, the use of multiple radio interfaces is widely seen as a practical
way to achieve high end -to -end network performance and better utilisation of
available spectrum. However this gives rise to another type of interference (referred to
as coexistence interference) due to co- location of multiple radio interfaces. We show
that such interference can be so severe that it prevents concurrent successful operation
of collocated interfaces even when they use channels from widely different frequency
bands. We propose the use of antenna polarisation to mitigate such interference and
experimentally study its benefits in both multi -band and single -band configurations. In
particular, we show that using differently polarised antennas on a multi -radio platform
can be a helpful counteracting mechanism for alleviating receiver blocking and adjacent
channel interference phenomena that underlie multi -radio coexistence interference.
We also validate observations about adjacent channel interference from previous
studies via direct and microscopic observation of MAC behaviour.Location is an indispensable information for navigation and sensing applications.
The rapidly growing adoption of smartphones has resulted in a plethora of mobile
applications that rely on position information (e.g., shopping apps that use user position
information to recommend products to users and help them to find what they want
in the store). WiFi fingerprinting is a popular and well studied approach for indoor
location estimation that leverages the existing WiFi infrastructure and works based on
the difference in strengths of the received AP signals at different locations. However,
understanding the impact of WiFi network deployment aspects such as multi -band
APs and VAPs has not received much attention in the literature. We first examine the
impact of various aspects underlying a WiFi fingerprinting system. Specifically, we
investigate different definitions for fingerprinting and location estimation algorithms
across different indoor environments ranging from a multi- storey office building to
shopping centres of different sizes. Our results show that the fingerprint definition
is as important as the choice of location estimation algorithm and there is no single
combination of these two that works across all environments or even all floors of a given environment. We then consider the effect of WiFi frequency bands (e.g., 2.4GHz
and 5GHz) and the presence of virtual access points (VAPs) on location accuracy with
WiFi fingerprinting. Our results demonstrate that lower co- channel interference in the
5GHz band yields more accurate location estimation. We show that the inclusion of
VAPs has a significant impact on the location accuracy of WiFi fingerprinting systems;
we analyse the potential reasons to explain the findings.End -to -end available bandwidth estimation (ABE) has a wide range of uses, from
adaptive application content delivery, transport-level transmission rate adaptation and
admission control to traffic engineering and peer node selection in peer -to- peer /overlay
networks [ 1, 2]. Given its importance, it has been received much research attention in
both wired data networks and legacy WiFi networks (based on 802.11 a/b /g standards),
resulting in different ABE techniques and tools proposed to optimise different criteria
and suit different scenarios. However, effects of new MAC/PHY layer enhancements
in new and next generation WiFi networks (based on 802.11n and 802.11ac
standards) have not been studied yet. We experimentally find that among different
new features like frame aggregation, channel bonding and MIMO modes (spacial division
multiplexing), frame aggregation has the most harmful effect as it has direct
effect on ABE by distorting the measurement probing traffic pattern commonly used
to estimate available bandwidth. Frame aggregation is also specified in both 802.11n
and 802.1 lac standards as a mandatory feature to be supported. We study the effect of
enabling frame aggregation, for the first time, on the performance of the ABE using an
indoor 802.11n wireless testbed. The analysis of results obtained using three tools -
representing two main Probe Rate Model (PRM) and Probe Gap Model (PGM) based
approaches for ABE - led us to come up with the two key principles of jumbo probes
and having longer measurement probe train sizes to counter the effects of aggregating
frames on the performance of ABE tools. Then, we develop a new tool, WBest+ that
is aware of the underlying frame aggregation by incorporating these principles. The
experimental evaluation of WBest+ shows more accurate ABE in the presence of frame
aggregation.Overall, the contributions of this thesis fall in three categories - experimental
characterisation, measurement techniques and mitigation/solution approaches for performance
problems in emerging WiFi network scenarios. The influence of various factors
mentioned above are all studied via experimental evaluation in a testbed or real - world setting. Specifically, co- existence interference characterisation and evaluation
of available bandwidth techniques are done using indoor testbeds, whereas characterisation of urban WiFi networks and WiFi fingerprinting based location estimation are
carried out in real environments. New measurement approaches are also introduced
to aid better experimental evaluation or proposed as new measurement tools. These
include mobile crowdsensing based WiFi monitoring; MAC/PHY layer monitoring of
co- existence interference; and WBest+ tool for available bandwidth estimation. Finally,
new mitigation approaches are proposed to address challenges and problems
identified throughout the characterisation studies. These include: a proposal for crowd - based interference management in large scale uncoordinated WiFi networks; exploiting
antenna polarisation diversity to remedy the effects of co- existence interference
in multi -interface platforms; taking advantage of VAPs and multi -band operation for
better location estimation; and introducing the jumbo frame concept and longer probe
train sizes to improve performance of ABE tools in next generation WiFi networks
- …