266 research outputs found

    On the Trade-Off Between Accuracy and Delay in Cooperative UWB Localization: Performance Bounds and Scaling Laws

    Get PDF
    Ultra-wide bandwidth (UWB) systems allow for accurate positioning in environments where global navigation satellite systems may fail, especially when complemented with cooperative processing. While cooperative UWB has led to centimeter-level accuracies, the communication overhead is often neglected. We quantify how accuracy and delay trade off in a wide variety of operation conditions. We also derive the asymptotic scaling of accuracy and delay, indicating that, in some conditions, standard cooperation offers the worst possible tradeoff. Both avenues lead to the same conclusion: indiscriminately targeting increased accuracy incurs a significant delay penalty. Simple countermeasures can be taken to reduce this penalty and obtain a meaningful accuracy/delay trade-off

    Detecting and Locating Man-in-the-Middle Attacks in Fixed Wireless Networks

    Get PDF
    We propose a novel method to detect and locate a Man-in-the-Middle attack in a fixed wireless network by analyzing round-trip time and measured received signal strength from fixed access points. The proposed method was implemented as a client-side application that establishes a baseline for measured round trip time (RTTs) and received signal strength (RSS) under no-threat scenarios and applies statistical measures on the measured RTT and RSS to detect and locate Man-in-the-Middle attacks.We show empirically that the presence of a Man-in-the-Middle attack incurs a significantly longer delay and larger standard deviation in measured RTT compared to that measured without a Man-in-the-Middle attack.We evaluated three machine learning algorithms on the measured RSS dataset to estimate the location of a Man-in-the-Middle attacker.Experimental results show that the proposed method can effectively detect and locate a Man-in-the-Middle attack and achieves a mean location estimation error of 0.8 meters in an indoor densely populated metropolitanenvironment.</p

    Pay as You Go: A Generic Crypto Tolling Architecture

    Full text link
    The imminent pervasive adoption of vehicular communication, based on dedicated short-range technology (ETSI ITS G5 or IEEE WAVE), 5G, or both, will foster a richer service ecosystem for vehicular applications. The appearance of new cryptography based solutions envisaging digital identity and currency exchange are set to stem new approaches for existing and future challenges. This paper presents a novel tolling architecture that harnesses the availability of 5G C-V2X connectivity for open road tolling using smartphones, IOTA as the digital currency and Hyperledger Indy for identity validation. An experimental feasibility analysis is used to validate the proposed architecture for secure, private and convenient electronic toll payment

    Secure location-aware communications in energy-constrained wireless networks

    Get PDF
    Wireless ad hoc network has enabled a variety of exciting civilian, industrial and military applications over the past few years. Among the many types of wireless ad hoc networks, Wireless Sensor Networks (WSNs) has gained popularity because of the technology development for manufacturing low-cost, low-power, multi-functional motes. Compared with traditional wireless network, location-aware communication is a very common communication pattern and is required by many applications in WSNs. For instance, in the geographical routing protocol, a sensor needs to know its own and its neighbors\u27 locations to forward a packet properly to the next hop. The application-aware communications are vulnerable to many malicious attacks, ranging from passive eavesdropping to active spoofing, jamming, replaying, etc. Although research efforts have been devoted to secure communications in general, the properties of energy-constrained networks pose new technical challenges: First, the communicating nodes in the network are always unattended for long periods without physical maintenance, which makes their energy a premier resource. Second, the wireless devices usually have very limited hardware resources such as memory, computation capacity and communication range. Third, the number of nodes can be potentially of very high magnitude. Therefore, it is infeasible to utilize existing secure algorithms designed for conventional wireless networks, and innovative mechanisms should be designed in a way that can conserve power consumption, use inexpensive hardware and lightweight protocols, and accommodate with the scalability of the network. In this research, we aim at constructing a secure location-aware communication system for energy-constrained wireless network, and we take wireless sensor network as a concrete research scenario. Particularly, we identify three important problems as our research targets: (1) providing correct location estimations for sensors in presence of wormhole attacks and pollution attacks, (2) detecting location anomalies according to the application-specific requirements of the verification accuracy, and (3) preventing information leakage to eavesdroppers when using network coding for multicasting location information. Our contributions of the research are as follows: First, we propose two schemes to improve the availability and accuracy of location information of nodes. Then, we study monitoring and detection techniques and propose three lightweight schemes to detect location anomalies. Finally, we propose two network coding schemes which can effectively prevent information leakage to eavesdroppers. Simulation results demonstrate the effectiveness of our schemes in enhancing security of the system. Compared to previous works, our schemes are more lightweight in terms of hardware cost, computation overhead and communication consumptions, and thus are suitable for energy-constrained wireless networks

    Accuracy and Delay: An Inherent Trade-off in Cooperative UWB Navigation

    Get PDF
    Location-aware applications and wireless sensor networks are becoming essential in our daily lives from a commercial, and public perspectives. The need of localization information to drive the applications is a key requirement. New technologies have emerged to tackle the problem of the limitations of the Global Positioning System (GPS) solutions. Ultra-wideband (UWB) is one of those emerging RF-technologies. The thrive in search for better accuracy involves improved ranging algorithms, higher transmission powers, and the use of cooperation among nodes. The goal of this thesis is to investigate the trade-off between medium access control (MAC) delay and accuracy for UWB systems based on hands-on experience and practical implementation with state-of-the-art equipment, based on two-way-ranging and a spatial time division multiple access scheme (STDMA).Paper A investigates the connection between accuracy and MAC delay for noncooperative scenarios. We quantify, by means of lower bounds how traditional methods to improve accuracy such as increased number of anchors, and increased communication range comes at a significant cost in terms of delay. Techniques such as selective ranging and eavesdropping help alleviate the trade-off and reduce the MAC delay in favor of mobile networks with tolerable accuracies. Paper B extends the work for cooperative scenarios, where nodes cooperate with each other by means of shared information. This sharing has an impact not only on the position accuracy but also on the MAC delay which we quantify by means of lower bounds, both for the accuracy and MAC delay. Once again, selective ranging is evaluated to reduce the MAC delay for finite cooperative networks. We show how indiscriminate cooperation leads to large MAC delays, which has a direct impact on the update rate for high mobility scenarios. Finally, Paper C unifies all findings by including derivations of the accuracy and MAC delay lower bounds for noncooperative and cooperative networks, evaluating selective ranging and eavesdropping to cope with the tradeoff in different conditions. Numerical evaluations are included for several distinct operations. Furthermore, we characterize the trade-off behavior for dense-location aware networks for both noncooperative and cooperative cases by means of scaling laws. We conclude by introducing a delay/accuracy parameter which can uniquely quantify the trade off between accuracy and MAC delay as a function of the agent and anchor density. Noncooperative eavesdropping shows to outperform cooperative networks in terms of accuracy with reasonable delays. Finally, in terms of scaling, we found that, under certain conditions, standard cooperative positioning exhibits the worst possible trade-off among the considered strategies

    A Comprehensive Survey on Routing and Security in Mobile Wireless Sensor Networks

    Get PDF
    With the continuous advances in mobile wirelesssensor networks (MWSNs), the research community hasresponded to the challenges and constraints in the design of thesenetworks by proposing efficient routing protocols that focus onparticular performance metrics such as residual energy utilization,mobility, topology, scalability, localization, data collection routing,Quality of Service (QoS), etc. In addition, the introduction ofmobility in WSN has brought new challenges for the routing,stability, security, and reliability of WSNs. Therefore, in thisarticle, we present a comprehensive and meticulous investigationin the routing protocols and security challenges in the theory ofMWSNs which was developed in recent years

    Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots

    Get PDF
    The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot
    corecore