12 research outputs found
Evaluation, energy optimization, and spectrum analysis of an artificial noise technique to improve CWSN security
This paper presents the security evaluation, energy consumption optimization, and spectrum scarcity analysis of artificial noise techniques to increase physical-layer security in Cognitive Wireless Sensor Networks (CWSNs). These techniques introduce noise into the spectrum in order to hide real information. Nevertheless, they directly affect two important parameters in Cognitive Wireless Sensor Networks (CWSNs), energy consumption and spectrum utilization. Both are affected because the number of packets transmitted by the network and the active period of the nodes increase. Security evaluation demonstrates that these techniques are effective against eavesdropper attacks, but also optimization allows for the implementation of these approaches in low-resource networks such as Cognitive Wireless Sensor Networks. In this work, the scenario is formally modeled and the optimization according to the simulation results and the impact analysis over the frequency spectrum are presented
Intrusion Detection and Security Mechanisms for Wireless Sensor Networks
Khan, S.; Lloret, J.; Loo, J. (2014). Intrusion Detection and Security Mechanisms for Wireless Sensor Networks. International Journal of Distributed Sensor Networks. 2014:1-3. doi:10.1155/2014/747483S13201
Intelligent Sensor Networks
In the last decade, wireless or wired sensor networks have attracted much attention. However, most designs target general sensor network issues including protocol stack (routing, MAC, etc.) and security issues. This book focuses on the close integration of sensing, networking, and smart signal processing via machine learning. Based on their world-class research, the authors present the fundamentals of intelligent sensor networks. They cover sensing and sampling, distributed signal processing, and intelligent signal learning. In addition, they present cutting-edge research results from leading experts
A Study on Techniques/Algorithms used for Detection and Prevention of Security Attacks in Cognitive Radio Networks
In this paper a detailed survey is carried out on the taxonomy of Security Issues, Advances on Security Threats and Countermeasures ,A Cross-Layer Attack, Security Status and Challenges for Cognitive Radio Networks, also a detailed survey on several Algorithms/Techniques used to detect and prevent SSDF(Spectrum Sensing Data Falsification) attack a type of DOS (Denial of Service) attack and several other Network layer attacks in Cognitive Radio Network or Cognitive Radio Wireless Sensor Node Networks(WSNN’s) to analyze the advantages and disadvantages of those existing algorithms/techniques
Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy
In this paper, we study radio frequency energy harvesting (EH) in a wireless sensor network in the presence of multiple eavesdroppers (EAVs). Specifically, the sensor source and multiple sensor relays harvest energy from multiple power transfer stations (PTSs), and then, the source uses this harvested energy to transmit information to the base station (BS) with the help of the relays. During the transmission of information, the BS typically faces a risk of losing information due to the EAVs. Thus, to enhance the secrecy of the considered system, one of the relays acts as a jammer, using harvested energy to generate interference with the EAVs. We propose a best-relay-and-best-jammer scheme for this purpose and compare this scheme with other previous schemes. The exact closed-form expression for the secrecy outage probability (SOP) is obtained and is validated through Monte Carlo simulations. A near-optimal EH time algorithm is also proposed. In addition, the effects on the SOP of key system parameters such as the EH efficiency coefficient, the EH time, the distance between the relay and BS, the number of PTSs, the number of relays, and the number of EAVs are investigated. The results indicate that the proposed scheme generally outperforms both the best-relay-and-random-jammer scheme and the random-relay-and-best-jammer scheme in terms of the secrecy capacity
Data-Driven Approach based on Deep Learning and Probabilistic Models for PHY-Layer Security in AI-enabled Cognitive Radio IoT.
PhD Theses.Cognitive Radio Internet of Things (CR-IoT) has revolutionized almost every eld of life
and reshaped the technological world. Several tiny devices are seamlessly connected in
a CR-IoT network to perform various tasks in many applications. Nevertheless, CR-IoT
su ers from malicious attacks that pulverize communication and perturb network performance.
Therefore, recently it is envisaged to introduce higher-level Arti cial Intelligence
(AI) by incorporating Self-Awareness (SA) capabilities into CR-IoT objects to facilitate
CR-IoT networks to establish secure transmission against vicious attacks autonomously.
In this context, sub-band information from the Orthogonal Frequency Division Multiplexing
(OFDM) modulated transmission in the spectrum has been extracted from the
radio device receiver terminal, and a generalized state vector (GS) is formed containing
low dimension in-phase and quadrature components. Accordingly, a probabilistic method
based on learning a switching Dynamic Bayesian Network (DBN) from OFDM transmission
with no abnormalities has been proposed to statistically model signal behaviors
inside the CR-IoT spectrum. A Bayesian lter, Markov Jump Particle Filter (MJPF),
is implemented to perform state estimation and capture malicious attacks.
Subsequently, GS containing a higher number of subcarriers has been investigated. In
this connection, Variational autoencoders (VAE) is used as a deep learning technique
to extract features from high dimension radio signals into low dimension latent space
z, and DBN is learned based on GS containing latent space data. Afterward, to perform
state estimation and capture abnormalities in a spectrum, Adapted-Markov Jump
Particle Filter (A-MJPF) is deployed. The proposed method can capture anomaly that
appears due to either jammer attacks in transmission or cognitive devices in a network
experiencing di erent transmission sources that have not been observed previously. The
performance is assessed using the receiver
Reliable and secure low energy sensed spectrum communication for time critical cloud computing applications
Reliability and security of data transmission and access are of paramount importance to enhance the dependability of time critical remote monitoring systems (e.g. tele-monitoring patients, surveillance of smart grid components). Potential failures for data transmissions include wireless channel unavailability and delays due to the interruptions. Reliable data transmission demands seamless channel availability with minimum delays in spite of interruptions (e.g. fading, denial-of-service attacks). Secure data transmissions require sensed data to be transmitted over unreliable wireless channels with sucient security using suitable encryption techniques. The transmitted data are stored in secure cloud repositories. Potential failures for data access include unsuccessful user authentications due to mis-management of digital identities and insucient permissions to authorize situation specic data access requests. Reliable and secure data access requires robust user authentication and context-dependent authorization to fulll situation specic data utility needs in cloud repositories. The work herein seeks to enhance the dependability of time critical remote monitoring applications, by reducing these failure conditions which may degrade the reliability and security of data transmission or access. As a result of an extensive literature survey, in order to achieve the above said security and reliability, the following areas have been selected for further investigations. The enhancement of opportunistic transmissions in cognitive radio networks to provide greater channel availability as opposed to xed spectrum allocations in conventional wireless networks. Delay sensitive channel access methods to ensure seamless connectivity in spite of multiple interruptions in cognitive radio networks. Energy ecient encryption and route selection mechanisms to enhance both secure and reliable data transmissions. Trustworthy digital identity management in cloud platforms which can facilitate ecient user authentication to ensure reliable access to the sensed remote monitoring data. Context-aware authorizations to reliably handle the exible situation specic data access requests. Main contributions of this thesis include a novel trust metric to select non-malicious cooperative spectrum sensing users to reliably detect vacant channels, a reliable delaysensitive cognitive radio spectrum hand-o management method for seamless connectivity and an energy-aware physical unclonable function based encryption key size selection method for secure data transmission. Furthermore, a trust based identity provider selection method for user authentications and a reliable context-aware situation specic authorization method are developed for more reliable and secure date access in cloud repositories. In conclusion, these contributions can holistically contribute to mitigate the above mentioned failure conditions to achieve the intended dependability of the timecritical remote monitoring applications