1,402 research outputs found

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Time Stamp based Cross Layer MANET Security Protocol

    Get PDF
    Mobile Adhoc Network (MANET) is a wireless network where nodes communicate through other nodes without the aid of a base station. Security is a major challenge in MANET as the packets are prone vulnerability and eavesdropping in wireless environment. Generally MAC layer provides the security in such wireless network through encryption and authentication and the protocol is called WEP. Many authentication and encryption techniques are proposed to increase the security of the MANET. But stronger Security leads to more energy loss as mobiles have less energy and limited processing capability. In this work a Cross layer timestamp based network security technique is developed. The technique reduces the encryption packet overflow which is due to PKE or public key exchange, and derives the public key directly from the neighbor2019;s table which is transmitted using routing information exchange. The simulation is performed with omnet++ simulator. Performance results demonstrate that the energy overhead due to encryption or performance compromise are very low in the proposed system. Further as the protocol is embedded in the network layer it is easily adoptable to any existing architecture without modifying the MAC or Physical layer standard or protocol

    On Security Analysis of Recent Password Authentication and Key Agreement Schemes Based on Elliptic Curve Cryptography

    Get PDF
    Secure and efficient mutual authentication and key agreement schemes form the basis for any robust network communication system. Elliptic Curve Cryptography (ECC) has emerged as one of the most successful Public Key Cryptosystem that efficiently meets all the security challenges. Comparison of ECC with other Public Key Cryptosystems (RSA, Rabin, ElGamal) shows that it provides equal level of security for a far smaller bit size, thereby substantially reducing the processing overhead. This makes it suitable for constrained environments like wireless networks and mobile devices as well as for security sensitive applications like electronic banking, financial transactions and smart grids. With the successful implementation of ECC in security applications (e-passports, e-IDs, embedded systems), it is getting widely commercialized. ECC is simple and faster and is therefore emerging as an attractive alternative for providing security in lightweight device, which contributes to its popularity in the present scenario. In this paper, we have analyzed some of the recent password based authentication and key agreement schemes using ECC for various environments. Furthermore, we have carried out security, functionality and performance comparisons of these schemes and found that they are unable to satisfy their claimed security goals

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm

    Get PDF
    Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN). This is because the radio frequency (RF) waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS). These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. Bluetooth technology started with a form of pairing called legacy pairing prior to any communication. However, due to the serious security issues found in the legacy pairing, a secure and simple pairing called SPP was announced with Bluetooth 2.1 and later since 2007. SPP has solved the main security issue which is the weaknesses of the PIN code in the legacy pairing, however it has been found with some vulnerabilities such as eavesdropping and man-in-the-middle (MITM) attacks. Since the discovery of these vulnerabilities, some enhancements have been proposed to the Bluetooth Specification Interest Group (SIG) which is the regulatory body of Bluetooth technology; nevertheless, some proposed enhancements are ineffective or are not yet implemented by Manufacturers. Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. The result was verified on a Graphical User Interface (GUI) built in Microsoft Visual Studio 2010 with C sharp as default environment. It has shown that the proposed scheme works perfectly with the used hardware and software. In addition, the protocol thwarts the passive and active eavesdropping attacks which exist during SSP. These attacks are defeated by avoiding the exchange of passwords and public keys in plain text between the Master and the Slave. Therefore, this protocol is expected to be implemented by the SIG to enhance the security in Bluetooth connection

    Survey on EAACK - A Secure Intrusion-Detection System for MANETs

    Get PDF
    The past few decade migration to wireless network from wired network has been a global trend. Wireless network made it possible in many applications to have mobility and scalability. Among all the modern wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. MANET is more popular now days. On the conflicting to traditional network architecture, MANET not has a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes within same communication range are communicated directly with each other. Otherwise, they depend on their neighbors to relay messages. Because of the self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. Now days, security has become a very important service in Mobile Adhoc Network. As Compared with other networks, MANETs are more vulnerable to various types of attacks. This paper presents an overview of Secure Intrusion-Detection Systems for discovering malicious nodes and attacks on MANETs. Because of some special characteristics of MANETs, prevention mechanisms alone are not satisfied to manage the secure networks. In this, detection should be focused as another part before an attacker can damage the structure of the system. This paper gives an overall overview of IDS architecture for improving the security level of MANETs. For enhancing the security based on security attributes and then various algorithms like RSA and DSA
    corecore