34 research outputs found
Wireless security for secure facilities
This thesis presents methods for securing a facility that has wireless connectivity. The goal of this research is to develop a solution to securing a facility that utilizes wireless communications. The research will introduce methods to track and locate the position of attackers. This research also introduces the idea of using a Honeynet system for added security. This research uses what is called Defense-In-Depth. Defense-in-depth is when multiple layers of security are used. The first of the layers is the Zone of Interference. This Zone is an area where jammer transmitters and directive antennas are set up to take advantage of the near-far-effect. The idea is to use the near-far-effect to give a stronger signal on the perimeter of the secure area, to mask any signals escaping from the secure area. This Zone uses directive Yagi antenna arrays to direct the radiation. There are multiple jamming methods that are utilized within this Zone. The next layer of security is the Honeynet Zone. The idea is to make an attacker believe that they are seeing real network traffic. This is done at the Honeynet Zone once a device has been determined to be unfriendly. Decoy mobile devices are first placed within the Honeynet Zone. Spoofed traffic is then created between the Honeynet base stations and the decoy mobile devices zone; using adaptive antennas incorporated within the design to face the signals away from the inside secure area. The third defense is position location and tracking. The idea is to have constant tracking of all devices in the area. There are several methods available to locate and track a device that is giving off an RF signal. This thesis looks at combining all these methods into an integrated, and more robust, facility security system
Securing a wireless sensor network for human tracking: a review of solutions
Currently, wireless sensor networks (WSNs) are formed by devices with limited resources and limited
power energy availability. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless
sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For
many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real
applications, a trade-off is required between the security level and energy consumption. This paper
evaluates different security schemes applied to human tracking applications, based on a real-case scenario.Junta de AndalucÃa P07-TIC-02476Junta de AndalucÃa TIC-570
Outage Constrained Robust BeamformingOptimization for Multiuser IRS-AssistedAnti-Jamming Communications With Incomplete Information
Malicious jamming attacks have been regarded asa serious threat to Internet of Things (IoT) networks, which cansignificantly degrade the quality of service (QoS) of users. Thispaper utilizes an intelligent reflecting surface (IRS) to enhanceanti-jamming performance due to its capability in reconfiguringthe wireless propagation environment via dynamicly adjustingeach IRS reflecting elements. To enhance the communicationperformance against jamming attacks, a robust beamformingoptimization problem is formulated in a multiuser IRS-assistedanti-jamming communications scenario with or without imperfectjammer’s channel state information (CSI). In addition, we furtherconsider the fact that the jammer’s transmit beamforming cannot be known at BS. Specifically, with no knowledge of jammerstransmit beamforming, the total transmit power minimizationproblems are formulated subject to the outage probability re-quirements of legitimate users with the jammer’s statistical CSI,and signal-to-interference-plus-noise ratio (SINR) requirementsof legitimate users without the jammer’s CSI, respectively.By applying the Decomposition-based large deviation inequal-ity (DBLDI), Bernstein-type inequality (BTI), Cauchy-Schwarzinequality, and penalty non-smooth optimization method, weefficiently solve the initial intractable and non-convex problems.Numerical simulations demonstrate that the proposed anti-jamming approaches achieve superior anti-jamming performanceand lower power-consumption compared to the non-IRS schemeand reveal the impact of key parameters on the achievable systemperformance
Medida e análise de atividade espetral
Mestrado em Engenharia Electrónica e TelecomunicaçõesThe dissertation deals with measuring and analyzing spectrum occupancy of a GSM900 band, DCS1800 band and all UMTS bandwidth. A modelization for analog power and binary quantized power is given. In the case of analog power, histograms of the power distribution during one working day are presented. In the case of quantized power the two time statistics, the time period of opportunities distribution and the time between opportunities distribution are presented, described and modeled. The measurement setup is standing in line of sight with the base station. Also, in terms of maximum sensitivity the measurement setup is described and analyzed. Spectrum non occupancy in terms of total time for the GSM900 band and the DCS1800 band is given, for a working day.Nesta dissertação são feitas medidas e a análise de ocupação de espectro em uma banda de GSM900, uma banda de DCS1800 e toda a largura de banda do UMTS. É apresentada uma modelização para potência analógica e para a potência binária quantizada. No caso da potência analógica são apresentados histogramas da distribuição de potência ao longo de um dia útil. No caso da potência quantizada as duas estatÃsticas, distribuição do perÃodo de tempo de oportunidades e distribuição do tempo entre oportunidades, são apresentadas, descritas e modeladas. O setup de medida encontra-se em linha de vista com a estação base. O setup é descrito e analisado em termos de máxima sensibilidade. A desocupação de espectro em termos de tempo total para a banda de GSM900 e para a banda DCS1800 é fornecida, para um dia de útil
DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD)
Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD) is our sixth textbook in a series covering the world of UASs and UUVs. Our textbook takes on a whole new purview for UAS / CUAS/ UUV (drones) – how they can be used to deploy Weapons of Mass Destruction and Deception against CBRNE and civilian targets of opportunity. We are concerned with the future use of these inexpensive devices and their availability to maleficent actors. Our work suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.https://newprairiepress.org/ebooks/1046/thumbnail.jp
Vulnerability assessment of modern ICT infrastructure from an information warfare perspective.
Ph. D. University of KwaZulu-Natal, Durban 2011.The overall objective of the study is to provide a vulnerability assessment of the mobile communications infrastructure to information warfare attacks; this study has a South African focus. The mobile infrastructure was selected as the infrastructure and mobile devices incorporate the majority of modern ICT technologies, namely social networking, wireless connectivity and mobility, mass storage, as well as the telecommunications elements. The objectives of the study are to: Propose a new information warfare model, and from this deduce a vulnerability assessment framework from the specific information warfare perspective. These are the guiding frameworks and model for the study. Gather information regarding threats and vulnerabilities, with particular focus on potential use in information warfare and relevance to South Africa. Establish the criticality of the mobile infrastructure in South Africa. Use the gathered information in the vulnerability assessment, to assess the vulnerability of the mobile infrastructure and related devices and services.
The model and framework are generated through desk-based research. The information is gathered from research protocols that are relevant to both research and risk and vulnerability assessment, these include: expert input through interviews and a research workshop, incident and trend analyses through news and vendor reports and academic publishing, computer simulation, questionnaire survey, and mathematical analyses. The information is then triangulated by using it in the vulnerability assessment.
The primary and secondary data shows that attacks on confidentiality are the most prevalent for both computer-based networks and the mobile infrastructure. An increase in threats and incidents for both computer and mobile platforms is being seen. The information security trends in South Africa indicate that the existing security concerns are likely to worsen, in particular the high infection rates. The research indicates that the mobile infrastructure is critical in South Africa. The study validates the proposed framework, which indicates that South Africa is vulnerable to an information warfare attack in general. Key aspects of vulnerability in the mobile infrastructure are highlighted; the apparent high load of the mobile infrastructure in South Africa can be seen as a high risk vulnerability. Suggestions to mitigate vulnerabilities and threats are provided
CROSS-LAYER SCHEDULING PROTOCOLS FOR MOBILE AD HOC NETWORKS USING ADAPTIVE DIRECT-SEQUENCE SPREAD-SPECTRUM MODULATION
We investigate strategies to improve the performance of transmission schedules for mobile ad hoc networks (MANETs) employing adaptive direct-sequence spread-spectrum (DSSS) modulation. Previously, scheduling protocols for MANETs have been designed under the assumption of an idealized, narrowband wireless channel. These protocols perform poorly when the channel model incorporates distance-based path loss and co-channel interference. Wideband communication systems, such as DSSS systems, are more robust in the presence of co-channel interference; however, DSSS also provides multiple-access capability that cannot be properly leveraged with a protocol designed for narrowband systems. We present a new transmission scheduling protocol that incorporates link characteristics, spreading factor adaptation, and packet capture capability into scheduling and routing decisions. This provides greater spatial reuse of the channel and better adaptability in mobile environments. Simulation results demonstrate the merits of this approach in terms of end-to-end packet throughput, delay, and completion rate for unicast traffic. We also discuss two variations of the protocol: one provides a method for enhancing the network topology through exchange of local information, and the other leverages multi-packet reception (MPR) capability to enhance the network topology. We show that each approach is useful in networks with sparse connectivity. We conclude by studying the capacity of the networks used in previous sections, providing insight on methods for realizing further performance gains
Cyber-Human Systems, Space Technologies, and Threats
CYBER-HUMAN SYSTEMS, SPACE TECHNOLOGIES, AND THREATS is our eighth textbook in a series covering the world of UASs / CUAS/ UUVs / SPACE. Other textbooks in our series are Space Systems Emerging Technologies and Operations; Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD); Disruptive Technologies with applications in Airline, Marine, Defense Industries; Unmanned Vehicle Systems & Operations On Air, Sea, Land; Counter Unmanned Aircraft Systems Technologies and Operations; Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd edition; and Unmanned Aircraft Systems (UAS) in the Cyber Domain Protecting USA’s Advanced Air Assets, 1st edition. Our previous seven titles have received considerable global recognition in the field. (Nichols & Carter, 2022) (Nichols, et al., 2021) (Nichols R. K., et al., 2020) (Nichols R. , et al., 2020) (Nichols R. , et al., 2019) (Nichols R. K., 2018) (Nichols R. K., et al., 2022)https://newprairiepress.org/ebooks/1052/thumbnail.jp
Mobile Ad-Hoc Networks
Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: vehicular ad-hoc networks, security and caching, TCP in ad-hoc networks and emerging applications. It is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks