2,381 research outputs found

    Network layer security: Design for a cross layer architecture

    Get PDF
    Traditional modular layering schemes have served a major part in the development of a variety of protocols. However, as the physical layer impairments become more unpredictable, a cross layer design (CLD) which is dynamic in nature provides better performance. CLD introduces new challenges in protocol design as well as in the area of security. Using numerical analysis, we show that a link layer design employing header compression and cross layer signalling to protect protocol headers can limit packet discarding. This paper also reviews the IPsec protocol and describes how IPsec can be modified for cross layer architecture. © 2007 IEEE

    Authentication of GNSS signal by Information-theoretic security

    Get PDF
    In this work a new authentication protocol for global navigation satellite system (GNSS) signals is proposed. The protocol uses artificial noise to confuse the adversary and send an initially hidden verification message. Correctness is based on information-theoretic security and performances are evaluated in terms of secrecy capacityope

    A software defined radio based anti-UAV mobile system with jamming and spoofing capabilities

    Get PDF
    The number of incidents between unmanned aerial vehicles (UAVs) and aircrafts at airports and airfields has been increasing over the last years. To address the problem, in this paper we describe a portable system capable of protecting areas against unauthorized UAVs, which is based on the use of low-cost SDR (software defined radio) platforms. The proposed anti-UAV system supports target localization and integrates effective jamming techniques with the generation of global positioning system (GPS) spoofing signals aimed at the drone. Real-life tests of the implemented prototype have shown that the proposed approach is capable of stopping the reliable reception of radionavigation signals and can also divert or even take control of unauthorized UAVs, whose flight path depends on the information obtained by the GPS system.info:eu-repo/semantics/publishedVersio

    Wireless Communication Technologies for Safe Cooperative Cyber Physical Systems

    Get PDF
    Cooperative Cyber-Physical Systems (Co-CPSs) can be enabled using wireless communication technologies, which in principle should address reliability and safety challenges. Safety for Co-CPS enabled by wireless communication technologies is a crucial aspect and requires new dedicated design approaches. In this paper, we provide an overview of five Co-CPS use cases, as introduced in our SafeCOP EU project, and analyze their safety design requirements. Next, we provide a comprehensive analysis of the main existing wireless communication technologies giving details about the protocols developed within particular standardization bodies. We also investigate to what extent they address the non-functional requirements in terms of safety, security and real time, in the different application domains of each use case. Finally, we discuss general recommendations about the use of different wireless communication technologies showing their potentials in the selected real-world use cases. The discussion is provided under consideration in the 5G standardization process within 3GPP, whose current efforts are inline to current gaps in wireless communications protocols for Co-CPSs including many future use casesinfo:eu-repo/semantics/publishedVersio

    PINSPOT: An oPen platform for INtelligent context-baSed Indoor POsiTioning

    Get PDF
    This work proposes PINSPOT; an open-access platform for collecting and sharing of context, algorithms and results in the cutting-edge area of indoor positioning. It is envisioned that this framework will become reference point for knowledge exchange which will bring the research community even closer and potentially enhance collaboration towards more effective and efficient creation of indoor positioning-related knowledge and innovation. Specifically, this platform facilitates the collection of sensor data useful for indoor positioning experimentation, the development of novel, self-learning, indoor positioning algorithms, as well as the enhancement and testing of existing ones and the dissemination and sharing of the proposed algorithms along with their configuration, the data used, and with their results

    Developing information services for special library users by designing a low cost digital library : the experiment of NOC-Digital Library

    Get PDF
    This research originates from a belief that special libraries in developing countries need to modernise and implement their ICT infrastructure and articulate information policies that will facilitate the exploitation of information resources to the optimum to increase national productivity. Special libraries and information centres in developing countries in general and in the Arab world in particular should start building their local digital libraries, as the benefit of establishing such electronic services is considerably massive and well known for expansion of research activities and for delivering services that satisfy the needs of targeted users. The aim of this paper is to provide general guideline for design a low cost digital library providing services that are most frequently required by various categories of special library users in developing countries. This paper also aims at illustrating strategies and method approaches that can be adopted for building such projects. The paper intends to describe the phases and stages implemented for building a low cost digital library services for the NOC. It also aims at highlighting the barriers and obstacles facing Arabic content in the digitization stage
    corecore