124,604 research outputs found
Real-time cross-layer design for large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks
IEEE 802.11 WMN is an emerging next generation low-cost multi-hop wireless broadband provisioning technology. It has the capability of integrating wired and wireless networks such as LANs, IEEE 802.11 WLANs, IEEE 802.16 WMANs, and sensor networks. This kind of integration: large-scale coverage, decentralised and multi-hop architecture, multi-radios, multi-channel assignments, ad hoc connectivity support the maximum freedom of users to join or leave the network from anywhere and at anytime has made the situation far more complex. As a result broadband resources are exposed to various kinds of security attacks, particularly DoS attacks
Statistical Watermarking for Networked Control Systems
Watermarking can detect sensor attacks in control systems by injecting a
private signal into the control, whereby attacks are identified by checking the
statistics of the sensor measurements and private signal. However, past
approaches assume full state measurements or a centralized controller, which is
not found in networked LTI systems with subcontrollers. Since generally the
entire system is neither controllable nor observable by a single subcontroller,
communication of sensor measurements is required to ensure closed-loop
stability. The possibility of attacking the communication channel has not been
explicitly considered by previous watermarking schemes, and requires a new
design. In this paper, we derive a statistical watermarking test that can
detect both sensor and communication attacks. A unique (compared to the
non-networked case) aspect of the implementing this test is the state-feedback
controller must be designed so that the closed-loop system is controllable by
each sub-controller, and we provide two approaches to design such a controller
using Heymann's lemma and a multi-input generalization of Heymann's lemma. The
usefulness of our approach is demonstrated with a simulation of detecting
attacks in a platoon of autonomous vehicles. Our test allows each vehicle to
independently detect attacks on both the communication channel between vehicles
and on the sensor measurements
Retroactive Anti-Jamming for MISO Broadcast Channels
Jamming attacks can significantly impact the performance of wireless
communication systems. In addition to reducing the capacity, such attacks may
lead to insurmountable overhead in terms of re-transmissions and increased
power consumption. In this paper, we consider the multiple-input single-output
(MISO) broadcast channel (BC) in the presence of a jamming attack in which a
subset of the receivers can be jammed at any given time. Further,
countermeasures for mitigating the effects of such jamming attacks are
presented. The effectiveness of these anti-jamming countermeasures is
quantified in terms of the degrees-of-freedom (DoF) of the MISO BC under
various assumptions regarding the availability of the channel state information
(CSIT) and the jammer state information at the transmitter (JSIT). The main
contribution of this paper is the characterization of the DoF region of the two
user MISO BC under various assumptions on the availability of CSIT and JSIT.
Partial extensions to the multi-user broadcast channels are also presented.Comment: submitted to IEEE Transactions on Information Theor
The High-Quality Wide Multi-Channel Attack (HQ-WMCA) database
The High-Quality Wide Multi-Channel Attack database (HQ-WMCA) database
extends the previous Wide Multi-Channel Attack database(WMCA), with more
channels including color, depth, thermal, infrared (spectra), and short-wave
infrared (spectra), and also a wide variety of attacks
- …