5,016 research outputs found
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Boston Unplugged: Mapping a Wireless Future
Reviews a variety of models that would allow Boston to provide free or low-cost high-speed Internet access citywide. Outlines the benefits and mechanics of citywide WiFi, and lists factors to consider in designing, developing, and deploying a system
State-of-the-art in Power Line Communications: from the Applications to the Medium
In recent decades, power line communication has attracted considerable
attention from the research community and industry, as well as from regulatory
and standardization bodies. In this article we provide an overview of both
narrowband and broadband systems, covering potential applications, regulatory
and standardization efforts and recent research advancements in channel
characterization, physical layer performance, medium access and higher layer
specifications and evaluations. We also identify areas of current and further
study that will enable the continued success of power line communication
technology.Comment: 19 pages, 12 figures. Accepted for publication, IEEE Journal on
Selected Areas in Communications. Special Issue on Power Line Communications
and its Integration with the Networking Ecosystem. 201
A framework for cross-layer measurement of 3G and Wi-Fi combined networks
3G networks and Wi-Fi networks could complement
each other as each has different advantages of coverage and
access capacity. A combined 3G and Wi-Fi network is one part of a
heterogeneous IP network which has ubiquitous access capacity.
However, the characteristics of the lower layers in the wireless
network portion of such a heterogeneous IP network could
significantly affect the performance of higher layers, and further,
the overall performance of the whole network. A single-layer
approach to performance analysis could not provide enough
information to present the correlation between lower and higher
layers. A cross-layer measurement approach for combined 3G and
Wi-Fi network is presented which aims to correlate the
characteristics of the physical layer (e.g. channel power and
signal-to-interference ratio) to key parameters of higher layer (e.g.
packet-loss ratio, and round trip time)
Securing Wireless Communication in Critical Infrastructure: Challenges and Opportunities
Critical infrastructure constitutes the foundation of every society. While
traditionally solely relying on dedicated cable-based communication, this
infrastructure rapidly transforms to highly digitized and interconnected
systems which increasingly rely on wireless communication. Besides providing
tremendous benefits, especially affording the easy, cheap, and flexible
interconnection of a large number of assets spread over larger geographic
areas, wireless communication in critical infrastructure also raises unique
security challenges. Most importantly, the shift from dedicated private wired
networks to heterogeneous wireless communication over public and shared
networks requires significantly more involved security measures. In this paper,
we identify the most relevant challenges resulting from the use of wireless
communication in critical infrastructure and use those to identify a
comprehensive set of promising opportunities to preserve the high security
standards of critical infrastructure even when switching from wired to wireless
communication.Comment: Author's version of a paper accepted for publication in Proceedings
of the 20th EAI International Conference on Mobile and Ubiquitous Systems:
Computing, Networking and Services (MobiQuitous 2023
An examination of home internet and mobile device use in the U.S
It is important to understand the determinants of the extent and types of activities performed by home Internet users and by mobile device users, as well as the interactions between these modes of usage. Few studies have looked at the interactions between these two channels of digital com-munication. While most prior research has been based upon surveys of attitudes toward and inten-tions to use a technology (and lack a final link to actual usage), in this study, the extent of actual home Internet use, mobile device use, and the simultaneity between these modes of usage are ex-amined. We find that, overall, mobile device use is enhanced by home Internet use, while the two act as substitutes in the case of advanced and sensitive applications
Managing Shared Access to a Spectrum Commons
The open access, unlicensed or spectrum commons approach to managing shared access to RF spectrum offers many attractive benefits, especially when implemented in conjunction with and as a complement to a regime of marketbased, flexible use, tradable licensed spectrum ([Benkler02], [Lehr04], [Werbach03]). However, as a number of critics have pointed out, implementing the unlicensed model poses difficult challenges that have not been well-addressed yet by commons advocates ([Benjam03], [Faulhab05], [Goodman04], [Hazlett01]). A successful spectrum commons will not be unregulated, but it also need not be command & control by another name. This paper seeks to address some of the implementation challenges associated with managing a spectrum commons. We focus on the minimal set of features that we believe a suitable management protocol, etiquette, or framework for a spectrum commons will need to incorporate. This includes: (1) No transmit only devices; (2) Power restrictions; (3) Common channel signaling; (4) Mechanism for handling congestion and allocating resources among users/uses in times of congestion; (5) Mechanism to support enforcement (e.g., established procedures to verify protocol is in conformance); (6) Mechanism to support reversibility of policy; and (7) Protection for privacy and security. We explain why each is necessary, examine their implications for current policy, and suggest ways in which they might be implemented. We present a framework that suggests a set of design principles for the protocols that will govern a successful commons management regime. Our design rules lead us to conclude that the appropriate Protocols for a Commons will need to be more liquid ([Reed05]) than in the past: (1) Marketbased instead of C&C; (2) Decentralized/distributed; and, (3) Adaptive and flexible (Anonymous, distributed, decentralized, and locally responsive)
A National Broadband Plan for Our Future: A Customer-Centric Framework
Congress has recently charged the Federal Communications Commission to establish a National Broadband Plan. This paper argues that a customer-centric plan, which puts the customer in control of decision-making, will yield the best broadband result for the U.S. The Federal government must establish a market infrastructure that encourages competition, requires transparency of both network providers and application providers, and includes vigorous antitrust enforcement. Competition from wireless broadband is present now and will become far more prevalent shortly, on the basis of current and announced investment plans. Regulators must also make available far more licensed spectrum to ensure this competition is realized. Calls for regulation in the form of mandated unbundling and more unlicensed spectrum are regulatory cul-de-sacs with proven track records of failure. Calls for regulatory control of network provider practices (other than transparency), such as network neutrality, are misguided. Such decisions are best left to customers, who can very well decide for themselves which of the broadband providers offer terms that best suit the customer.Technology and Industry
- …