3 research outputs found

    Mitigating External Threats in Wireless Local Area Networks

    Get PDF
    As computer networks become more critical to enterprises, it is inevitable that efficient security policies are designed, case in point: wireless networks, in order to effectively ensure the confidentiality, availability, and integrity of the data traversing these networks. The primary objective of this paper is to appropriately simulate an enterprise network, and evaluate the threats, and possible mitigation approaches applicable. An analysis of an enterprise WLAN (Wireless Local Area Network) was carried out, to identify relevant vulnerabilities, and possible countermeasures against these threats. The primary threats analysed were those possible by an external adversary. Upon identification of said threats, a security model was developed, so as to improve enterprise network security, and ensure the levels are optimum. In addition, a number of the principles involved are applicable to non-wireless networks.   Keywords: WLAN, Wireless, Security, WPA 2, IEEE 802.11. 

    A Novel and Low Processing Time ECG Security Method Suitable for Sensor Node Platforms

    Get PDF
    An anonymisation of electrocardiogram (ECG) signal is essential during the distribution and storage in a public repository. In this paper, we propose a novel low processing time ECG anonymisation method based on the fast Fourier transform (FFT) algorithm that is suitable for sensor node platforms. The proposed framework was developed to address two major constraints in the Internet of Medical Thing environment, i.e., immediate need for securing ECG signal and efficient method for overcoming physical limitation of sensor nodes. Performance evaluation by way of computer simulation over normal and abnormal ECG signals showed that the proposed framework was able to conceal fiducial and non-fiducial features of the ECG signals. Additionally, it showed that the proposed framework offered flexibility in determining the secret key length of the anonymised ECG signal. Strong cross-correlation indicated close similarity between the original and the reconstructed ECG signals implying lossless reconstruction of the original ECG signal. Furthermore, the proposed method achieved a lower processing time security algorithm as compared with the recently proposed wavelet based anonymisation methods

    Evaluation of DoS attacks on Commercial Wi-Fi-Based UAVs

    Get PDF
    One of the biggest challenges for the use of Unmanned Aerial Vehicles (UAVs) in large-scale real-world applications is security.  However, most of research projects related to robotics does not discuss security issues, moving on directly to studying classical problems (i.e., perception, control, planning). This paper evaluates the effects of availability issues (Denial of Service attacks) in two commonly used commercially available UAVs (AR.Drone 2.0 and 3DR SOLO). Denial of Service (DoS) attacks are made while the vehicles are navigating, simulating common conditions found both by the general public and in a research scenario. Experiments show how effective such attacks are and demonstrate actual security breaches that create specific vulnerabilities. The results indicate that both studied UAVs are susceptible to several types of DoS attacks which can critically influence the performance of UAVs during navigation, including a decrease in camera functionality, drops in telemetry feedback and lack of response to remote control commands. We also present a tool that can be used as a failsafe mechanism to alert the user when a drone is reaching out a determined flight limit range, avoiding availability issues
    corecore