2 research outputs found

    Testing of ISM band at remotes for unlocking vehicles

    Get PDF
    ArticleEvery modern car has a remote control for wireless unlocking. Wireless drivers for unlocking the vehicle using frequency in the ISM bands. ISM bands are unlicensed bands. They are usually used for industrial, medical and scientific purposes. The question is whether wireless transmission parameters are sufficient and do not violate defined range of ISM band. Another important aspect is the security of the wireless transmissions and any other signal interference. The problem of interference plays an important role in ensuring the quality and safety of wireless communications, especially when wireless networks can be found everywhere. The issues of remote control vehicles is very important due to the resulting security of a guarded vehicle. One of the major risks that may occur are data transmission that the signal is blocked by another signal and the end user does not notice. In this case, does not lock the vehicle nor ensuring its securing security system. Tests which were performed accurately determined the bandwidth of broadcast remote control for each vehicle. Vehicles for which the tests were conducted are standard vehicles used to frequent occurrence. These are the following types: Alfa Romeo, Hyundai, Mercedes, Škoda and Toyota. Subsequently, the analysis was performed of transmission compared with standard broadcast of jammers. All test drivers worked in the band ISM433. These tests clearly demonstrated that not every manufacturer strictly observes ranges of ISM band. This may affect traffic on surrounding licensed bands

    Data analytics methods for attack detection and localization in wireless networks

    Get PDF
    Wireless ad hoc network operates without any fixed infrastructure and centralized administration. It is a group of wirelessly connected nodes having the capability to work as host and router. Due to its features of open communication medium, dynamic changing topology, and cooperative algorithm, security is the primary concern when designing wireless networks. Compared to the traditional wired network, a clean division of layers may be sacrificed for performance in wireless ad hoc networks. As a result, they are vulnerable to various types of attacks at different layers of the protocol stack. In this paper, I present real-time series data analysis solutions to detect various attacks including in- band wormholes attack in the network layer, various MAC layer misbehaviors, and jamming attack in the physical layer. And, I also investigate the problem of node localization in wireless and sensor networks, where a total of n anchor nodes are used to determine the locations of other nodes based on the received signal strengths. A range-based machine learning algorithm is developed to tackle the challenges --Abstract, page iii
    corecore