2,491 research outputs found
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
Low Power, Low Delay: Opportunistic Routing meets Duty Cycling
Traditionally, routing in wireless sensor networks consists of
two steps: First, the routing protocol selects a next hop,
and, second, the MAC protocol waits for the intended destination
to wake up and receive the data. This design makes
it difficult to adapt to link dynamics and introduces delays
while waiting for the next hop to wake up.
In this paper we introduce ORW, a practical opportunistic
routing scheme for wireless sensor networks. In a dutycycled
setting, packets are addressed to sets of potential receivers
and forwarded by the neighbor that wakes up first
and successfully receives the packet. This reduces delay and
energy consumption by utilizing all neighbors as potential
forwarders. Furthermore, this increases resilience to wireless
link dynamics by exploiting spatial diversity. Our results
show that ORW reduces radio duty-cycles on average
by 50% (up to 90% on individual nodes) and delays by 30%
to 90% when compared to the state of the art
An Analytical Model of Packet Collisions in IEEE 802.15.4 Wireless Networks
Numerous studies showed that concurrent transmissions can boost wireless
network performance despite collisions. While these works provide empirical
evidence that concurrent transmissions may be received reliably, existing
signal capture models only partially explain the root causes of this
phenomenon. We present a comprehensive mathematical model that reveals the
reasons and provides insights on the key parameters affecting the performance
of MSK-modulated transmissions. A major contribution is a closed-form
derivation of the receiver bit decision variable for arbitrary numbers of
colliding signals and constellations of power ratios, timing offsets, and
carrier phase offsets. We systematically explore the root causes for successful
packet delivery under concurrent transmissions across the whole parameter space
of the model. We confirm the capture threshold behavior observed in previous
studies but also reveal new insights relevant for the design of optimal
protocols: We identify capture zones depending not only on the signal power
ratio but also on time and phase offsets.Comment: Accepted for publication in the IEEE Transactions on Wireless
Communications under the title "On the Reception of Concurrent Transmissions
in Wireless Sensor Networks.
A Study of Medium Access Control Protocols for Wireless Body Area Networks
The seamless integration of low-power, miniaturised, invasive/non-invasive
lightweight sensor nodes have contributed to the development of a proactive and
unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health
monitoring of a patient without any constraint on his/her normal dailylife
activities. This monitoring requires low-power operation of
invasive/non-invasive sensor nodes. In other words, a power-efficient Medium
Access Control (MAC) protocol is required to satisfy the stringent WBAN
requirements including low-power consumption. In this paper, we first outline
the WBAN requirements that are important for the design of a low-power MAC
protocol. Then we study low-power MAC protocols proposed/investigated for WBAN
with emphasis on their strengths and weaknesses. We also review different
power-efficient mechanisms for WBAN. In addition, useful suggestions are given
to help the MAC designers to develop a low-power MAC protocol that will satisfy
the stringent WBAN requirements.Comment: 13 pages, 8 figures, 7 table
Let the Tree Bloom: Scalable Opportunistic Routing with ORPL
Routing in battery-operated wireless networks is challenging, posing a tradeoff between energy and latency. Previous work has shown that opportunistic routing can achieve low-latency data collection in duty-cycled networks. However, applications are now considered where nodes are not only periodic data sources, but rather addressable end points generating traffic with arbitrary patterns.
We present ORPL, an opportunistic routing protocol that supports any-to-any, on-demand traffic. ORPL builds upon RPL, the standard protocol for low-power IPv6 networks. By combining RPL's tree-like topology with opportunistic routing, ORPL forwards data to any destination based on the mere knowledge of the nodes' sub-tree. We use bitmaps and Bloom filters to represent and propagate this information in a space-efficient way, making ORPL scale to large networks of addressable nodes. Our results in a 135-node testbed show that ORPL outperforms a number of state-of-the-art solutions including RPL and CTP, conciliating a sub-second latency and a sub-percent duty cycle. ORPL also increases robustness and scalability, addressing the whole network reliably through a 64-byte Bloom filter, where RPL needs kilobytes of routing tables for the same task
The Triangle Metric: Fast Link Quality Estimation for Mobile Wireless Sensor Networks (Invited Paper)
ReSensesuppleCONE
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
- …