667 research outputs found

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Spectrum Sensing and Security Challenges and Solutions: Contemporary Affirmation of the Recent Literature

    Get PDF
    Cognitive radio (CR) has been recently proposed as a promising technology to improve spectrum utilization by enabling secondary access to unused licensed bands. A prerequisite to this secondary access is having no interference to the primary system. This requirement makes spectrum sensing a key function in cognitive radio systems. Among common spectrum sensing techniques, energy detection is an engaging method due to its simplicity and efficiency. However, the major disadvantage of energy detection is the hidden node problem, in which the sensing node cannot distinguish between an idle and a deeply faded or shadowed band. Cooperative spectrum sensing (CSS) which uses a distributed detection model has been considered to overcome that problem. On other dimension of this cooperative spectrum sensing, this is vulnerable to sensing data falsification attacks due to the distributed nature of cooperative spectrum sensing. As the goal of a sensing data falsification attack is to cause an incorrect decision on the presence/absence of a PU signal, malicious or compromised SUs may intentionally distort the measured RSSs and share them with other SUs. Then, the effect of erroneous sensing results propagates to the entire CRN. This type of attacks can be easily launched since the openness of programmable software defined radio (SDR) devices makes it easy for (malicious or compromised) SUs to access low layer protocol stacks, such as PHY and MAC. However, detecting such attacks is challenging due to the lack of coordination between PUs and SUs, and unpredictability in wireless channel signal propagation, thus calling for efficient mechanisms to protect CRNs. Here in this paper we attempt to perform contemporary affirmation of the recent literature of benchmarking strategies that enable the trusted and secure cooperative spectrum sensing among Cognitive Radios

    Energy Efficient Cooperative Communication

    Get PDF
    This dissertation studies several problems centered around developing a better understanding of the energy efficiency of cooperative wireless communication systems. Cooperative communication is a technique where two or more nodes in a wireless network pool their antenna resources to form a virtual antenna array . Over the last decade, researchers have shown that many of the benefits of real antenna arrays, e.g. spatial diversity, increased range, and/or decreased transmission energy, can be achieved by nodes using cooperative transmission. This dissertation extends the current body of knowledge by providing a comprehensive study of the energy efficiency of two-source cooperative transmission under differing assumptions about channel state knowledge, cooperative protocol, and node selfishness. The first part of this dissertation analyzes the effect of channel state information on the optimum energy allocation and energy efficiency of a simple cooperative transmission protocol called orthogonal amplify-and-forward (OAF). The source nodes are required to achieve a quality-of service (QoS) constraint, e.g. signal to noise ratio or outage probability, at the destination. Since a QoS constraint does not specify a unique transmit energy allocation when the nodes use OAF cooperative transmission, minimum total energy strategies are provided for both short-term and long-term QoS constraints. For independent Rayleigh fading channels, full knowledge of the channel state at both of the sources and at the destination is shown to significantly improve the energy efficiency of OAF cooperative transmission as well as direct (non-cooperative) transmission. The results also demonstrate how channel state knowledge affects the minimum total energy allocation strategy. Under identical channel state knowledge assumptions, the results demonstrate that OAF cooperative transmission tends to have better energy efficiency than direct transmission over a wide range of channel conditions. The second part of this dissertation focuses on the development of an opportunistic hybrid cooperative transmission protocol that achieves increased energy efficiency by not only optimizing the resource allocation but also by selecting the most energy efficient cooperative transmission protocol from a set of available protocols according to the current channel state. The protocols considered in the development of the hybrid cooperative transmission protocol include compress-and-forward (CF), estimate-and-forward (EF), non-orthogonal amplify-and-forward (NAF), and decode-and-forward (DF). Instantaneous capacity results are analyzed under the assumption of full channel state knowledge at both of the sources and the destination node. Numerical results are presented showing that the delay limited capacity and outage probability of the hybrid cooperative transmission protocol are superior to that of any single protocol and are also close to the cut-set bound over a wide range of channel conditions. The final part of this dissertation focuses on the issue of node selfishness in cooperative transmission. It is common to assume in networks with a central authority, e.g. military networks, that nodes will always be willing to offer help to other nodes when requested to do so. This assumption may not be valid in ad hoc networks operating without a central authority. This section of the dissertation considers the effect selfish behavior on the energy efficiency of cooperative communication systems. Using tools from non-cooperative game theory, a two-player relaying game is formulated and analyzed in non-fading and fading channel scenarios. In non-fading channels, it is shown that a cooperative equilibrium can exist between two self-interested sources given that the end of the cooperative interaction is uncertain, that the sources can achieve mutual benefit through cooperation, and that the sources are sufficiently patient in the sense that they value future payoffs. In fading channels, a cooperative conditional trigger strategy is proposed and shown to be an equilibrium of the two-player game. Sources following this strategy are shown to achieve an energy efficiency very close to that of a centrally-controlled system when they are sufficiently patient. The results in this section show that cooperation can often be established between two purely self-interested sources without the development of extrinsic incentive mechanisms like virtual currency

    Spatial Throughput Maximization of Wireless Powered Communication Networks

    Full text link
    Wireless charging is a promising way to power wireless nodes' transmissions. This paper considers new dual-function access points (APs) which are able to support the energy/information transmission to/from wireless nodes. We focus on a large-scale wireless powered communication network (WPCN), and use stochastic geometry to analyze the wireless nodes' performance tradeoff between energy harvesting and information transmission. We study two cases with battery-free and battery-deployed wireless nodes. For both cases, we consider a harvest-then-transmit protocol by partitioning each time frame into a downlink (DL) phase for energy transfer, and an uplink (UL) phase for information transfer. By jointly optimizing frame partition between the two phases and the wireless nodes' transmit power, we maximize the wireless nodes' spatial throughput subject to a successful information transmission probability constraint. For the battery-free case, we show that the wireless nodes prefer to choose small transmit power to obtain large transmission opportunity. For the battery-deployed case, we first study an ideal infinite-capacity battery scenario for wireless nodes, and show that the optimal charging design is not unique, due to the sufficient energy stored in the battery. We then extend to the practical finite-capacity battery scenario. Although the exact performance is difficult to be obtained analytically, it is shown to be upper and lower bounded by those in the infinite-capacity battery scenario and the battery-free case, respectively. Finally, we provide numerical results to corroborate our study.Comment: 15 double-column pages, 8 figures, to appear in IEEE JSAC in February 2015, special issue on wireless communications powered by energy harvesting and wireless energy transfe

    Securing Cognitive Radio Networks using blockchains

    Get PDF
    Due to the increase in industrial applications of Internet of Things (IoT), number of internet connected devices have been increased accordingly. This has resulted in big challenges in terms of accessibility, scalability, connectivity and adaptability. IoT is capable of creating connections between devices on wireless medium but the utilization of scarce spectrum in efficient manner for the establishment of these connections is the biggest concern. To accommodate spectrum allocation problem different radio technologies are being utilized. One of the most efficient technique being used is cognitive radio, which dynamically allocate the unlicensed spectrum for IoT applications. Spectrum sensing being the fundamental component of Cognitive Radio Network (CRN) is threatened by security attacks. Process of spectrum sensing is disturbed by the malicious user (MU) which attacks the primary signal detection and affects the accuracy of sensing outcome. The presence of such MU in system, sending false sensing data can degrade the performance of cognitive radios. Therefore, in this article a blockchain based method is proposed for the MU detection in network. By using this method an MU can easily be discriminated from a reliable user through cryptographic keys. The efficiency of the proposed mechanism is analyzed through proper simulations using MATLAB. Consequently, this mechanism can be deployed for the validation of participating users in the process of spectrum sensing in CRN for IoTs.publishe

    Spectrum sensing and occupancy prediction for cognitive machine-to-machine wireless networks

    Get PDF
    A thesis submitted to the University of Bedfordshire, in partial fulfil ment of the requirements for the degree of Doctor of Philosophy (PhD)The rapid growth of the Internet of Things (IoT) introduces an additional challenge to the existing spectrum under-utilisation problem as large scale deployments of thousands devices are expected to require wireless connectivity. Dynamic Spectrum Access (DSA) has been proposed as a means of improving the spectrum utilisation of wireless systems. Based on the Cognitive Radio (CR) paradigm, DSA enables unlicensed spectrum users to sense their spectral environment and adapt their operational parameters to opportunistically access any temporally unoccupied bands without causing interference to the primary spectrum users. In the same context, CR inspired Machine-to-Machine (M2M) communications have recently been proposed as a potential solution to the spectrum utilisation problem, which has been driven by the ever increasing number of interconnected devices. M2M communications introduce new challenges for CR in terms of operational environments and design requirements. With spectrum sensing being the key function for CR, this thesis investigates the performance of spectrum sensing and proposes novel sensing approaches and models to address the sensing problem for cognitive M2M deployments. In this thesis, the behaviour of Energy Detection (ED) spectrum sensing for cognitive M2M nodes is modelled using the two-wave with dffi use power fading model. This channel model can describe a variety of realistic fading conditions including worse than Rayleigh scenarios that are expected to occur within the operational environments of cognitive M2M communication systems. The results suggest that ED based spectrum sensing fails to meet the sensing requirements over worse than Rayleigh conditions and consequently requires the signal-to-noise ratio (SNR) to be increased by up to 137%. However, by employing appropriate diversity and node cooperation techniques, the sensing performance can be improved by up to 11.5dB in terms of the required SNR. These results are particularly useful in analysing the eff ects of severe fading in cognitive M2M systems and thus they can be used to design effi cient CR transceivers and to quantify the trade-o s between detection performance and energy e fficiency. A novel predictive spectrum sensing scheme that exploits historical data of past sensing events to predict channel occupancy is proposed and analysed. This approach allows CR terminals to sense only the channels that are predicted to be unoccupied rather than the whole band of interest. Based on this approach, a spectrum occupancy predictor is developed and experimentally validated. The proposed scheme achieves a prediction accuracy of up to 93% which in turn can lead to up to 84% reduction of the spectrum sensing cost. Furthermore, a novel probabilistic model for describing the channel availability in both the vertical and horizontal polarisations is developed. The proposed model is validated based on a measurement campaign for operational scenarios where CR terminals may change their polarisation during their operation. A Gaussian approximation is used to model the empirical channel availability data with more than 95% confi dence bounds. The proposed model can be used as a means of improving spectrum sensing performance by using statistical knowledge on the primary users occupancy pattern

    SPECTRUM SENSING AND COOPERATION IN COGNITIVE-OFDM BASED WIRELESS COMMUNICATIONS NETWORKS

    Get PDF
    The world has witnessed the development of many wireless systems and applications. In addition to the large number of existing devices, such development of new and advanced wireless systems increases rapidly the demand for more radio spectrum. The radio spectrum is a limited natural resource; however, it has been observed that it is not efficiently utilized. Consequently, different dynamic spectrum access techniques have been proposed as solutions for such an inefficient use of the spectrum. Cognitive Radio (CR) is a promising intelligent technology that can identify the unoccupied portions of spectrum and opportunistically uses those portions with satisfyingly high capacity and low interference to the primary users (i.e., licensed users). The CR can be distinguished from the classical radio systems mainly by its awareness about its surrounding radio frequency environment. The spectrum sensing task is the main key for such awareness. Due to many advantages, Orthogonal Frequency Division Multiplexing system (OFDM) has been proposed as a potential candidate for the CR‟s physical layer. Additionally, the Fast Fourier Transform (FFT) in an OFDM receiver supports the performance of a wide band spectrum analysis. Multitaper spectrum estimation method (MTM) is a non-coherent promising spectrum sensing technique. It tolerates problems related to bad biasing and large variance of power estimates. This thesis focuses, generally, on the local, multi antenna based, and global cooperative spectrum sensing techniques at physical layer in OFDM-based CR systems. It starts with an investigation on the performance of using MTM and MTM with singular value decomposition in CR networks using simulation. The Optimal MTM parameters are then found. The optimal MTM based detector theoretical formulae are derived. Different optimal and suboptimal multi antenna based spectrum sensing techniques are proposed to improve the local spectrum sensing performance. Finally, a new concept of cooperative spectrum sensing is introduced, and new strategies are proposed to optimize the hard cooperative spectrum sensing in CR networks. The MTM performance is controlled by the half time bandwidth product and number of tapers. In this thesis, such parameters have been optimized using Monte Carlo simulation. The binary hypothesis test, here, is developed to ensure that the effect of choosing optimum MTM parameters is based upon performance evaluation. The results show how these optimal parameters give the highest performance with minimum complexity when MTM is used locally at CR. The optimal MTM based detector has been derived using Neyman-Pearson criterion. That includes probabilities of detection, false alarm and misses detection approximate derivations in different wireless environments. The threshold and number of sensed samples controlling is based on this theoretical work. In order to improve the local spectrum sensing performance at each CR, in the CR network, multi antenna spectrum sensing techniques are proposed using MTM and MTM with singular value decomposition in this thesis. The statistical theoretical formulae of the proposed techniques are derived including the different probabilities. ii The proposed techniques include optimal, that requires prior information about the primary user signal, and two suboptimal multi antenna spectrum sensing techniques having similar performances with different computation complexity; these do not need prior information about the primary user signalling. The work here includes derivations for the periodogram multi antenna case. Finally, in hard cooperative spectrum sensing, the cooperation optimization is necessary to improve the overall performance, and/or minimize the number of data to be sent to the main CR-base station. In this thesis, a new optimization method based on optimizing the number of locally sensed samples at each CR is proposed with two different strategies. Furthermore, the different factors that affect the hard cooperative spectrum sensing optimization are investigated and analysed and a new cooperation scheme in spectrum sensing, the master node, is proposed.Ministry of Interior-Kingdom of Saudi Arabi

    Secure key design approaches using entropy harvesting in wireless sensor network: A survey

    Get PDF
    Physical layer based security design in wireless sensor networks have gained much importance since the past decade. The various constraints associated with such networks coupled with other factors such as their deployment mainly in remote areas, nature of communication etc. are responsible for development of research works where the focus is secured key generation, extraction, and sharing. Keeping the importance of such works in mind, this survey is undertaken that provides a vivid description of the different mechanisms adopted for securely generating the key as well its randomness extraction and also sharing. This survey work not only concentrates on the more common methods, like received signal strength based but also goes on to describe other uncommon strategies such as accelerometer based. We first discuss the three fundamental steps viz. randomness extraction, key generation and sharing and their importance in physical layer based security design. We then review existing secure key generation, extraction, and sharing mechanisms and also discuss their pros and cons. In addition, we present a comprehensive comparative study of the recent advancements in secure key generation, sharing, and randomness extraction approaches on the basis of adversary, secret bit generation rate, energy efficiency etc. Finally, the survey wraps up with some promising future research directions in this area
    corecore