2,906 research outputs found

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Detailed examination of a packet collision model for Bluetooth Low Energy advertising mode

    Get PDF
    The aim of this paper is to investigate the amount of energy that is required to successfully transmit information inside the Bluetooth Low Energy (BLE) advertising packets. There are applications that require more than one BLE node to simultaneously transmit data. The BLE protocol utilizes a specific communication method termed advertising mode to perform unidirectional broadcasts of data from the advertising devices. However, with an increased number of BLE devices advertising simultaneously, there will be inevitable packet collisions from the advertising devices. This results in a waste of energy, specifically in low-power applications where lower consumption is desirable to minimize the need for battery replacements. This paper examines a packet collision model for the BLE advertising mode with the results validated using experimental data. Our analysis shows that when the throughput of the BLE network starts to fall due to an increase in the number of packet collisions, the energy consumption of the BLE nodes increase exponentially with respect to the number of nodes

    ์ด๊ธฐ์ข… IoT ๊ธฐ๊ธฐ๊ฐ„ ํ˜‘๋ ฅ์„ ํ†ตํ•œ ๋„คํŠธ์›Œํฌ ์„ฑ๋Šฅ ํ–ฅ์ƒ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ •๋ณด๊ณตํ•™๋ถ€, 2022. 8. ๋ฐ•์„ธ์›….The Internet of Things (IoT) has become a daily life by pioneering applications in various fields. In this dissertation, we consider increasing transmission data rate with energy efficiency, extending transmission coverage with low power, and improving reliability in congested frequency bands as three challenges to expanding IoT applications. We address two issues to overcome these challenges. First, we design a layered network system with a new structure that combines Bluetooth Low Energy (BLE) and Wi-Fi networks in a multi-hop network. Based on the system, we propose methods to increase data rate with energy efficiency and extend transmission coverage in a low-power situation. We implement the proposed system in the Linux kernel and evaluate the performance through an indoor testbed. As a result, we confirmed that the proposed system supports high data traffic and reduces average power consumption in the testbed compared to the existing single BLE/Wi-Fi ad-hoc network in a multi-hop situation. Second, we tackle the adaptive frequency hopping (AFH) problem of BLE through cross-technology communication (CTC) and channel weighting. We design the AFH scheme that weights the channels used by BLE devices with improving reliability in the congested bands of both Wi-Fi and BLE devices. We evaluate the proposed scheme through prototype experiments and simulations, confirming that the proposed scheme increases the packet reception rate of BLE in the congested ISM band compared to the existing AFH algorithm.์‚ฌ๋ฌผ์ธํ„ฐ๋„ท์€ ํ˜„์žฌ ๋‹ค์–‘ํ•œ ์˜์—ญ์—์„œ application์„ ๊ฐœ์ฒ™ํ•˜์—ฌ ์ƒํ™œํ™”๋˜์–ด ์™”๋‹ค. ์ด ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š” ์‚ฌ๋ฌผ์ธํ„ฐ๋„ท์˜ ์‘์šฉ ์‚ฌ๋ก€ ํ™•์žฅ์„ ์œ„ํ•ด ์—๋„ˆ์ง€ ํšจ์œจ์ ์ธ ์ „์†ก ์†๋„ ํ–ฅ์ƒ, ์ €์ „๋ ฅ ์ƒํ™ฉ์—์„œ์˜ ์ „์†ก ๋ฒ”์œ„ ํ™•์žฅ, ํ˜ผ์žกํ•œ ๋Œ€์—ญ์—์„œ์˜ ์‹ ๋ขฐ์„ฑ ํ–ฅ์ƒ์„ ์ƒˆ๋กœ์šด ๋„์ „ ๊ณผ์ œ๋กœ ์‚ผ๊ณ , ์ด๋Ÿฌํ•œ ๋„์ „ ๊ณผ์ œ๋ฅผ ๊ทน๋ณตํ•  ๋‘ ๊ฐ€์ง€ ์ฃผ์ œ๋ฅผ ๋‹ค๋ฃฌ๋‹ค. ์ฒซ์งธ, ๋‹ค์ค‘ ํ™‰ ๋„คํŠธ์›Œํฌ ์ƒํ™ฉ์—์„œ์˜ ๋ธ”๋ฃจํˆฌ์Šค ์ €์ „๋ ฅ๊ณผ Wi-Fi ๋„คํŠธ์›Œํฌ๋ฅผ ๊ฒฐํ•ฉ ํ•œ ์ƒˆ๋กœ์šด ๊ตฌ์กฐ์˜ ๊ณ„์ธต์  ๋„คํŠธ์›Œํฌ ์‹œ์Šคํ…œ์„ ์„ค๊ณ„ํ•˜๊ณ  ์ด์— ๊ธฐ๋ฐ˜ํ•œ ์—๋„ˆ์ง€ ํšจ์œจ์ ์ธ ์ „์†ก ์†๋„ ํ–ฅ์ƒ ๋ฐ ์ €์ „๋ ฅ ์ƒํ™ฉ์—์„œ์˜ ์ „์†ก ๋ฒ”์œ„ํ™•์žฅ์„ ์ œ์•ˆํ•œ๋‹ค. ์ œ์•ˆ๋œ ์‹œ์Šคํ…œ์€ Linux ์ปค๋„์— ๊ตฌํ˜„ํ•˜์—ฌ ์‹ค๋‚ด ํ…Œ์ŠคํŠธ๋ฒ ๋“œ๋ฅผ ํ†ตํ•ด ์„ฑ๋Šฅ์„ ํ‰๊ฐ€ํ•œ๋‹ค. ๊ฒฐ๊ณผ์ ์œผ๋กœ ์ œ์•ˆ ํ•œ ๊ธฐ๋ฒ•์ด ๋‹ค์ค‘ ํ™‰ ์ƒํ™ฉ์—์„œ ๊ธฐ์กด ๋ธ”๋ฃจํˆฌ์Šค ์ €์ „๋ ฅ/Wi-Fi ๋‹จ์ผ ad-hoc ๋„คํŠธ์›Œํฌ์™€ ๋น„๊ตํ•˜์—ฌ ๋†’์€ ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ์„ ์ง€์›ํ•˜๋ฉฐ, ํ…Œ์ŠคํŠธ๋ฒ ๋“œ์—์„œ์˜ ํ‰๊ท  ์ „๋ ฅ ์†Œ๋น„๋ฅผ ์ค„ ์ด๋Š” ๊ฒƒ์„ ํ™•์ธํ•œ๋‹ค. ๋‘˜์งธ, Cross-technology Communication (CTC)๊ณผ ์ฑ„๋„ ๊ฐ€์ค‘์น˜๋ฅผ ํ†ตํ•œ ๋ธ”๋ฃจํˆฌ์Šค ์ €์ „๋ ฅ์˜ Adaptive Frequency Hopping (AFH) ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•œ๋‹ค. ์ตœ์ข…์ ์œผ๋กœ ๋ธ”๋ฃจํˆฌ์Šค ์ €์ „๋ ฅ ๊ธฐ๊ธฐ๊ฐ€ ์‚ฌ์šฉํ•˜๋Š” ์ฑ„๋„์— ๊ฐ€์ค‘์น˜๋ฅผ ๋‘๋Š” AFH ๊ธฐ๋ฒ•์„ ์„ค๊ณ„ํ•˜์—ฌ Wi-Fi ์™€ ๋ธ”๋ฃจํˆฌ์Šค ์ €์ „๋ ฅ ๊ธฐ๊ธฐ๊ฐ€ ๋ชจ๋‘ ํ˜ผ์žกํ•œ ๋Œ€์—ญ์—์„œ์˜ ์‹ ๋ขฐ์„ฑ์„ ํ–ฅ์ƒํ•œ๋‹ค. ํ”„๋กœํ† ํƒ€์ž… ์‹คํ—˜๊ณผ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ์ œ์•ˆํ•œ ๊ธฐ๋ฒ•์ด ๊ธฐ์กด์˜ AFH ๊ธฐ๋ฒ•๊ณผ ๋น„๊ตํ•˜์—ฌ ํ˜ผ์žกํ•œ ISM ๋Œ€์—ญ์—์„œ ๋ธ”๋ฃจํˆฌ์Šค ์ €์ „๋ ฅ์˜ ํŒจํ‚ท ์ˆ˜์‹ ์œจ์„ ์ฆ๊ฐ€์‹œํ‚ค๋Š” ๊ฒƒ์„ ํ™•์ธํ•œ๋‹ค.1 Introduction 1 1.1 Motivation 1 1.2 Contributions and Outline 2 2 Wi-BLE: On Cooperative Operation of Wi-Fi and Bluetooth Low Energy under IPv6 4 2.1 Introduction 4 2.2 Related Work 7 2.2.1 Multihop Connectivity for Wi-Fi or BLE 7 2.2.2 Multi-radio Operation 11 2.3 System Overview 13 2.3.1 Control Plane 13 2.3.2 Data Plane 16 2.3.3 Overall Procedure 16 2.4 MABLE: AODV Routing over BLE 17 2.4.1 BLE Channel Utilization 17 2.4.2 Joint Establishment of Route and Connection 20 2.4.3 Link Quality Metric for BLE Data Channels 22 2.4.4 Bi-directional Route Error Propagation 25 2.5 Wi-BLE: Wi-Fi Ad-hoc over BLE 27 2.5.1 Radio Selection 27 2.5.2 Routing and Radio Wake-up for Wi-Fi 30 2.6 Evaluation 32 2.6.1 BLE Routing 33 2.6.2 Wi-Fi Routing over BLE 35 2.6.3 Radio Selection 38 2.7 Summary 40 3 WBC-AFH: Direct Wi-Fi to BLE Communication based AFH 41 3.1 Introduction 41 3.2 Background 45 3.2.1 Frequency hopping in BLE 45 3.2.2 Cross Technology Communication 47 3.3 Proposed AFH 49 3.3.1 CTC based informing 50 3.3.2 Weighted channel select 51 3.3.3 Hopping set size optimization 52 3.3.4 WBC-AFH 54 3.4 Evaluation 57 3.4.1 Setup 57 3.4.2 Robustness 60 3.4.3 Reliability 61 3.5 Future Work 65 3.6 Summary 66 4 Conclusion 67๋ฐ•

    A comprehensive survey of wireless body area networks on PHY, MAC, and network layers solutions

    Get PDF
    Recent advances in microelectronics and integrated circuits, system-on-chip design, wireless communication and intelligent low-power sensors have allowed the realization of a Wireless Body Area Network (WBAN). A WBAN is a collection of low-power, miniaturized, invasive/non-invasive lightweight wireless sensor nodes that monitor the human body functions and the surrounding environment. In addition, it supports a number of innovative and interesting applications such as ubiquitous healthcare, entertainment, interactive gaming, and military applications. In this paper, the fundamental mechanisms of WBAN including architecture and topology, wireless implant communication, low-power Medium Access Control (MAC) and routing protocols are reviewed. A comprehensive study of the proposed technologies for WBAN at Physical (PHY), MAC, and Network layers is presented and many useful solutions are discussed for each layer. Finally, numerous WBAN applications are highlighted

    Advanced Protocols for Peer-to-Peer Data Transmission in Wireless Gigabit Networks

    Get PDF
    This thesis tackles problems on IEEE 802.11 MAC layer, network layer and application layer, to further push the performance of wireless P2P applications in a holistic way. It contributes to the better understanding and utilization of two major IEEE 802.11 MAC features, frame aggregation and block acknowledgement, to the design and implementation of opportunistic networks on off-the-shelf hardware and proposes a document exchange protocol, including document recommendation. First, this thesis contributes a measurement study of the A-MPDU frame aggregation behavior of IEEE 802.11n in a real-world, multi-hop, indoor mesh testbed. Furthermore, this thesis presents MPDU payload adaptation (MPA) to utilize A-MPDU subframes to increase the overall throughput under bad channel conditions. MPA adapts the size of MAC protocol data units to channel conditions, to increase the throughput and lower the delay in error-prone channels. The results suggest that under erroneous conditions throughput can be maximized by limiting the MPDU size. As second major contribution, this thesis introduces Neighborhood-aware OPPortunistic networking on Smartphones (NOPPoS). NOPPoS creates an opportunistic, pocket-switched network using current generation, off-the-shelf mobile devices. As main novel feature, NOPPoS is highly responsive to node mobility due to periodic, low-energy scans of its environment, using Bluetooth Low Energy advertisements. The last major contribution is the Neighborhood Document Sharing (NDS) protocol. NDS enables users to discover and retrieve arbitrary documents shared by other users in their proximity, i.e. in the communication range of their IEEE 802.11 interface. However, IEEE 802.11 connections are only used on-demand during file transfers and indexing of files in the proximity of the user. Simulations show that NDS interconnects over 90 \% of all devices in communication range. Finally, NDS is extended by the content recommendation system User Preference-based Probability Spreading (UPPS), a graph-based approach. It integrates user-item scoring into a graph-based tag-aware item recommender system. UPPS utilizes novel formulas for affinity and similarity scoring, taking into account user-item preference in the mass diffusion of the recommender system. The presented results show that UPPS is a significant improvement to previous approaches

    Analysis of current and potential sensor network technologies and their incorporation as embedded structural system

    Get PDF
    This document provides a brief overview of the actual wireless ad hoc sensor networks technologies and standards available, especially in view of their possible implementation for shipping container protection and monitoring within the framework of the STEC Action aiming at analyzing possible technical solutions to improve the security of the millions of containers moving in and out of Europe. Examples of applications and research projects are reported from the literature to give insights on the possibility of implementation of wireless sensor networks in real world scenarios.JRC.G.5-European laboratory for structural assessmen

    A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks

    Get PDF
    In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs
    • โ€ฆ
    corecore