5,016 research outputs found

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Boston Unplugged: Mapping a Wireless Future

    Get PDF
    Reviews a variety of models that would allow Boston to provide free or low-cost high-speed Internet access citywide. Outlines the benefits and mechanics of citywide WiFi, and lists factors to consider in designing, developing, and deploying a system

    State-of-the-art in Power Line Communications: from the Applications to the Medium

    Get PDF
    In recent decades, power line communication has attracted considerable attention from the research community and industry, as well as from regulatory and standardization bodies. In this article we provide an overview of both narrowband and broadband systems, covering potential applications, regulatory and standardization efforts and recent research advancements in channel characterization, physical layer performance, medium access and higher layer specifications and evaluations. We also identify areas of current and further study that will enable the continued success of power line communication technology.Comment: 19 pages, 12 figures. Accepted for publication, IEEE Journal on Selected Areas in Communications. Special Issue on Power Line Communications and its Integration with the Networking Ecosystem. 201

    A framework for cross-layer measurement of 3G and Wi-Fi combined networks

    Get PDF
    3G networks and Wi-Fi networks could complement each other as each has different advantages of coverage and access capacity. A combined 3G and Wi-Fi network is one part of a heterogeneous IP network which has ubiquitous access capacity. However, the characteristics of the lower layers in the wireless network portion of such a heterogeneous IP network could significantly affect the performance of higher layers, and further, the overall performance of the whole network. A single-layer approach to performance analysis could not provide enough information to present the correlation between lower and higher layers. A cross-layer measurement approach for combined 3G and Wi-Fi network is presented which aims to correlate the characteristics of the physical layer (e.g. channel power and signal-to-interference ratio) to key parameters of higher layer (e.g. packet-loss ratio, and round trip time)

    Securing Wireless Communication in Critical Infrastructure: Challenges and Opportunities

    Full text link
    Critical infrastructure constitutes the foundation of every society. While traditionally solely relying on dedicated cable-based communication, this infrastructure rapidly transforms to highly digitized and interconnected systems which increasingly rely on wireless communication. Besides providing tremendous benefits, especially affording the easy, cheap, and flexible interconnection of a large number of assets spread over larger geographic areas, wireless communication in critical infrastructure also raises unique security challenges. Most importantly, the shift from dedicated private wired networks to heterogeneous wireless communication over public and shared networks requires significantly more involved security measures. In this paper, we identify the most relevant challenges resulting from the use of wireless communication in critical infrastructure and use those to identify a comprehensive set of promising opportunities to preserve the high security standards of critical infrastructure even when switching from wired to wireless communication.Comment: Author's version of a paper accepted for publication in Proceedings of the 20th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2023

    The Emerging WLAN-Infrastructure: Complement or Substitute?

    Get PDF

    An examination of home internet and mobile device use in the U.S

    Get PDF
    It is important to understand the determinants of the extent and types of activities performed by home Internet users and by mobile device users, as well as the interactions between these modes of usage. Few studies have looked at the interactions between these two channels of digital com-munication. While most prior research has been based upon surveys of attitudes toward and inten-tions to use a technology (and lack a final link to actual usage), in this study, the extent of actual home Internet use, mobile device use, and the simultaneity between these modes of usage are ex-amined. We find that, overall, mobile device use is enhanced by home Internet use, while the two act as substitutes in the case of advanced and sensitive applications

    Managing Shared Access to a Spectrum Commons

    Get PDF
    The open access, unlicensed or spectrum commons approach to managing shared access to RF spectrum offers many attractive benefits, especially when implemented in conjunction with and as a complement to a regime of marketbased, flexible use, tradable licensed spectrum ([Benkler02], [Lehr04], [Werbach03]). However, as a number of critics have pointed out, implementing the unlicensed model poses difficult challenges that have not been well-addressed yet by commons advocates ([Benjam03], [Faulhab05], [Goodman04], [Hazlett01]). A successful spectrum commons will not be unregulated, but it also need not be command & control by another name. This paper seeks to address some of the implementation challenges associated with managing a spectrum commons. We focus on the minimal set of features that we believe a suitable management protocol, etiquette, or framework for a spectrum commons will need to incorporate. This includes: (1) No transmit only devices; (2) Power restrictions; (3) Common channel signaling; (4) Mechanism for handling congestion and allocating resources among users/uses in times of congestion; (5) Mechanism to support enforcement (e.g., established procedures to verify protocol is in conformance); (6) Mechanism to support reversibility of policy; and (7) Protection for privacy and security. We explain why each is necessary, examine their implications for current policy, and suggest ways in which they might be implemented. We present a framework that suggests a set of design principles for the protocols that will govern a successful commons management regime. Our design rules lead us to conclude that the appropriate Protocols for a Commons will need to be more liquid ([Reed05]) than in the past: (1) Marketbased instead of C&C; (2) Decentralized/distributed; and, (3) Adaptive and flexible (Anonymous, distributed, decentralized, and locally responsive)

    A National Broadband Plan for Our Future: A Customer-Centric Framework

    Get PDF
    Congress has recently charged the Federal Communications Commission to establish a National Broadband Plan. This paper argues that a customer-centric plan, which puts the customer in control of decision-making, will yield the best broadband result for the U.S. The Federal government must establish a market infrastructure that encourages competition, requires transparency of both network providers and application providers, and includes vigorous antitrust enforcement. Competition from wireless broadband is present now and will become far more prevalent shortly, on the basis of current and announced investment plans. Regulators must also make available far more licensed spectrum to ensure this competition is realized. Calls for regulation in the form of mandated unbundling and more unlicensed spectrum are regulatory cul-de-sacs with proven track records of failure. Calls for regulatory control of network provider practices (other than transparency), such as network neutrality, are misguided. Such decisions are best left to customers, who can very well decide for themselves which of the broadband providers offer terms that best suit the customer.Technology and Industry
    corecore