2 research outputs found
Testing of ISM band at remotes for unlocking vehicles
ArticleEvery modern car has a remote control for wireless unlocking. Wireless drivers for
unlocking the vehicle using frequency in the ISM bands. ISM bands are unlicensed bands. They
are usually used for industrial, medical and scientific purposes. The question is whether wireless
transmission parameters are sufficient and do not violate defined range of ISM band. Another
important aspect is the security of the wireless transmissions and any other signal interference.
The problem of interference plays an important role in ensuring the quality and safety of wireless
communications, especially when wireless networks can be found everywhere. The issues of
remote control vehicles is very important due to the resulting security of a guarded vehicle. One
of the major risks that may occur are data transmission that the signal is blocked by another signal
and the end user does not notice. In this case, does not lock the vehicle nor ensuring its securing
security system. Tests which were performed accurately determined the bandwidth of broadcast
remote control for each vehicle. Vehicles for which the tests were conducted are standard vehicles
used to frequent occurrence. These are the following types: Alfa Romeo, Hyundai, Mercedes,
Škoda and Toyota. Subsequently, the analysis was performed of transmission compared with
standard broadcast of jammers. All test drivers worked in the band ISM433. These tests clearly
demonstrated that not every manufacturer strictly observes ranges of ISM band. This may affect
traffic on surrounding licensed bands
Data analytics methods for attack detection and localization in wireless networks
Wireless ad hoc network operates without any fixed infrastructure and centralized administration. It is a group of wirelessly connected nodes having the capability to work as host and router. Due to its features of open communication medium, dynamic changing topology, and cooperative algorithm, security is the primary concern when designing wireless networks. Compared to the traditional wired network, a clean division of layers may be sacrificed for performance in wireless ad hoc networks. As a result, they are vulnerable to various types of attacks at different layers of the protocol stack. In this paper, I present real-time series data analysis solutions to detect various attacks including in- band wormholes attack in the network layer, various MAC layer misbehaviors, and jamming attack in the physical layer. And, I also investigate the problem of node localization in wireless and sensor networks, where a total of n anchor nodes are used to determine the locations of other nodes based on the received signal strengths. A range-based machine learning algorithm is developed to tackle the challenges --Abstract, page iii