1,463 research outputs found

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    JamLab: Augmenting Sensornet Testbeds with Realistic and Controlled Interference Generation

    Get PDF
    Radio interference drastically affects the performance of sensor-net communications, leading to packet loss and reduced energy-efficiency. As an increasing number of wireless devices operates on the same ISM frequencies, there is a strong need for understanding and debugging the performance of existing sensornet protocols under interference. Doing so requires a low-cost flexible testbed infrastructure that allows the repeatable generation of a wide range of interference patterns. Unfortunately, to date, existing sensornet testbeds lack such capabilities, and do not permit to study easily the coexistence problems between devices sharing the same frequencies. This paper addresses the current lack of such an infrastructure by using off-the-shelf sensor motes to record and playback interference patterns as well as to generate customizable and repeat-able interference in real-time. We propose and develop JamLab: a low-cost infrastructure to augment existing sensornet testbeds with accurate interference generation while limiting the overhead to a simple upload of the appropriate software. We explain how we tackle the hardware limitations and get an accurate measurement and regeneration of interference, and we experimentally evaluate the accuracy of JamLab with respect to time, space, and intensity. We further use JamLab to characterize the impact of interference on sensornet MAC protocols

    Network Traffic Aware Smartphone Energy Savings

    Get PDF
    In today\u27s world of ubiquitous Smartphone use, extending the battery life has become an important issue. A significant contributor to battery drain is wireless networking. Common usage patterns expect Smartphones to maintain a constant Internet connection which exacerbates the problem.;Our research entitled A Network Traffic Approach to Smartphone Energy Savings focuses on extending Smartphone battery life by investigating how network traffic impacts power management of wireless devices. We explore 1) Real-time VoIP application energy savings by exploiting silence periods in conversation. WiFi is opportunistically placed into low power mode during Silence periods. 2.) The priority of Smartphone Application network traffic is used to modifiy WiFi radio power management using machine learning assisted prioritization. High priority network traffic is optimized for performance, consuming more energy while low priority network traffic is optimized for energy conservation. 3.) A hybrid multiple PHY, MAC layer approach to saving energy is also utilized. The Bluetooth assisted WiFi approach saves energy by combining high power, high throughput WiFi with low power, lower throughput Bluetooth. The switch between Bluetooth and WiFi is done opportunistically based upon the current data rate and health of the Bluetooth connection.;Our results show that application specific methods for wireless energy savings are very effective. We have demonstrated energy savings exceeding 50% in generic cases. With real-time VoIP applications we have shown upwards of 40% energy savings while maintaining good call quality. The hybrid multiple PHY approach saves more than 25% energy over existing solutions while attaining the capability of quickly adapting to changes in network traffic

    A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks

    Get PDF
    In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs
    • …
    corecore