1,359 research outputs found

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Wireless Intrusion Prevention Systems

    Get PDF
    The wireless networks have changed the way organizations work and offered a new range of possibilities, but at the same time they introduced new security threats. While an attacker needs physical access to a wired network in order to launch an attack, a wireless network allows anyone within its range to passively monitor the traffic or even start an attack. One of the countermeasures can be the use of Wireless Intrusion Prevention Systems.Network security, IDS, IPS, wireless intrusion detection, wireless intrusion prevention.

    Internet Censorship: An Integrative Review of Technologies Employed to Limit Access to the Internet, Monitor User Actions, and their Effects on Culture

    Get PDF
    The following conducts an integrative review of the current state of Internet Censorship in China, Iran, and Russia, highlights common circumvention technologies (CTs), and analyzes the effects Internet Censorship has on cultures. The author spends a large majority of the paper delineating China’s Internet infrastructure and prevalent Internet Censorship Technologies/Techniques (ICTs), paying particular attention to how the ICTs function at a technical level. The author further analyzes the state of Internet Censorship in both Iran and Russia from a broader perspective to give a better understanding of Internet Censorship around the globe. The author also highlights specific CTs, explaining how they function at a technical level. Findings indicate that among all three nation-states, state control of Internet Service Providers is the backbone of Internet Censorship. Specifically, within China, it is discovered that the infrastructure functions as an Intranet, thereby creating a closed system. Further, BGP Hijacking, DNS Poisoning, and TCP RST attacks are analyzed to understand their use-case within China. It is found that Iran functions much like a weaker version of China in regards to ICTs, with the state seemingly using the ICT of Bandwidth Throttling rather consistently. Russia’s approach to Internet censorship, in stark contrast to Iran and China, is found to rely mostly on the legislative system and fear to implement censorship, though their technical level of ICT implementation grows daily. TOR, VPNs, and Proxy Servers are all analyzed and found to be robust CTs. Drawing primarily from the examples given throughout the paper, the author highlights the various effects of Internet Censorship on culture – noting that at its core, Internet Censorship destroys democracy

    Impact and Mitigation of Cyberattacks on IoT devices: A Lens on Smart Home

    Get PDF
    This Master's thesis, undertaken at the University of Turku in conjunction with an internship at Alten France, delves into the escalating issue of cyberattacks on IoT devices. This burgeoning area has begun to permeate various sectors of society, most notably through consumer products in smart homes. The primary motivations behind this chosen topic are the increased prevalence of IoT devices in our everyday lives and the corresponding surge in cyber threats, alongside the topic's real-world applicability to my work at Alten France, which is heavily invested in digital technology and innovation. The thesis begins with a comprehensive exploration of the current landscape of IoT cyber threats, including various attack vectors and their impact on different types of IoT devices. The challenges of securing IoT devices are then examined, highlighting the limitations and vulnerabilities of the IoT infrastructure. The research analyzes the impacts of cyberattacks on individual users, organizations, and society at large. It covers a wide range of consequences, such as privacy violations, financial losses, disruptions to critical infrastructure, and effects such as eroded trust in digital systems. The latter segment of the thesis addresses potential solutions and preventive measures to mitigate these impacts. The research does not aim to propose new strategies but seeks to inform future mitigation efforts based on its thorough analysis. On the whole, this thesis presents a meticulous and extensive examination of the impacts of cyberattacks on IoT devices, with an emphasis on smart homes. It underscores the urgent requirement for bolstered cybersecurity measures in our increasingly interconnected world, highlighting the severe repercussions of neglecting this need. By deepening the understanding of the extensive impacts of these cyberattacks, this research contributes valuable insights to academic discussions and supplies essential information for policymakers and industry professionals to develop more secure and resilient IoT systems
    • …
    corecore