2,063 research outputs found
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
Random Access for Massive MIMO Systems with Intra-Cell Pilot Contamination
Massive MIMO systems, where the base stations are equipped with hundreds of
antenna elements, are an attractive way to attain unprecedented spectral
efficiency in future wireless networks. In the "classical" massive MIMO
setting, the terminals are assumed fully loaded and a main impairment to the
performance comes from the inter-cell pilot contamination, i.e., interference
from terminals in neighboring cells using the same pilots as in the home cell.
However, when the terminals are active intermittently, it is viable to avoid
inter-cell contamination by pre-allocation of pilots, while same-cell terminals
use random access to select the allocated pilot sequences. This leads to the
problem of intra-cell pilot contamination. We propose a framework for random
access in massive MIMO networks and derive new uplink sum rate expressions that
take intra-cell pilot collisions, intermittent terminal activity, and
interference into account. We use these expressions to optimize the terminal
activation probability and pilot length
Massive MIMO for Internet of Things (IoT) Connectivity
Massive MIMO is considered to be one of the key technologies in the emerging
5G systems, but also a concept applicable to other wireless systems. Exploiting
the large number of degrees of freedom (DoFs) of massive MIMO essential for
achieving high spectral efficiency, high data rates and extreme spatial
multiplexing of densely distributed users. On the one hand, the benefits of
applying massive MIMO for broadband communication are well known and there has
been a large body of research on designing communication schemes to support
high rates. On the other hand, using massive MIMO for Internet-of-Things (IoT)
is still a developing topic, as IoT connectivity has requirements and
constraints that are significantly different from the broadband connections. In
this paper we investigate the applicability of massive MIMO to IoT
connectivity. Specifically, we treat the two generic types of IoT connections
envisioned in 5G: massive machine-type communication (mMTC) and ultra-reliable
low-latency communication (URLLC). This paper fills this important gap by
identifying the opportunities and challenges in exploiting massive MIMO for IoT
connectivity. We provide insights into the trade-offs that emerge when massive
MIMO is applied to mMTC or URLLC and present a number of suitable communication
schemes. The discussion continues to the questions of network slicing of the
wireless resources and the use of massive MIMO to simultaneously support IoT
connections with very heterogeneous requirements. The main conclusion is that
massive MIMO can bring benefits to the scenarios with IoT connectivity, but it
requires tight integration of the physical-layer techniques with the protocol
design.Comment: Submitted for publicatio
A Multi-Agent Security Testbed for the Analysis of Attacks and Defenses in Collaborative Sensor Fusion
The performance and safety of autonomous vehicles (AVs) deteriorates under
adverse environments and adversarial actors. The investment in multi-sensor,
multi-agent (MSMA) AVs is meant to promote improved efficiency of travel and
mitigate safety risks. Unfortunately, minimal investment has been made to
develop security-aware MSMA sensor fusion pipelines leaving them vulnerable to
adversaries. To advance security analysis of AVs, we develop the Multi-Agent
Security Testbed, MAST, in the Robot Operating System (ROS2). Our framework is
scalable for general AV scenarios and is integrated with recent multi-agent
datasets. We construct the first bridge between AVstack and ROS and develop
automated AV pipeline builds to enable rapid AV prototyping. We tackle the
challenge of deploying variable numbers of agent/adversary nodes at launch-time
with dynamic topic remapping. Using this testbed, we motivate the need for
security-aware AV architectures by exposing the vulnerability of centralized
multi-agent fusion pipelines to (un)coordinated adversary models in case
studies and Monte Carlo analysis
- …