5,199 research outputs found
Safe and Secure Wireless Power Transfer Networks: Challenges and Opportunities in RF-Based Systems
RF-based wireless power transfer networks (WPTNs) are deployed to transfer
power to embedded devices over the air via RF waves. Up until now, a
considerable amount of effort has been devoted by researchers to design WPTNs
that maximize several objectives such as harvested power, energy outage and
charging delay. However, inherent security and safety issues are generally
overlooked and these need to be solved if WPTNs are to be become widespread.
This article focuses on safety and security problems related WPTNs and
highlight their cruciality in terms of efficient and dependable operation of
RF-based WPTNs. We provide a overview of new research opportunities in this
emerging domain.Comment: Removed some references, added new references, corrected typos,
revised some sections (mostly I-B and III-C
A Fair and Secure Cluster Formation Process for Ad Hoc Networks
An efficient approach for organizing large ad hoc networks is to divide the nodes
into multiple clusters and designate, for each cluster, a clusterhead which is responsible for
holding intercluster control information. The role of a clusterhead entails rights and duties.
On the one hand, it has a dominant position in front of the others because it manages the
connectivity and has access to other nodeÂżs sensitive information. But on the other hand, the
clusterhead role also has some associated costs. Hence, in order to prevent malicious nodes
from taking control of the group in a fraudulent way and avoid selfish attacks from suitable
nodes, the clusterhead needs to be elected in a secure way. In this paper we present a novel
solution that guarantees the clusterhead is elected in a cheat-proof manner
AMISEC: Leveraging Redundancy and Adaptability to Secure AmI Applications
Security in Ambient Intelligence (AmI) poses too many challenges due to the inherently insecure nature of wireless sensor nodes. However, there are two characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in previous approaches, we assume an individual wireless node is vulnerable. We present an agent-based architecture with supporting services that is proven to be adequate to detect and confine common attacks. Decisions at different levels are supported by a trust-based framework with good and bad reputation feedback while maintaining resistance to bad-mouthing attacks. We also propose a set of services that can be used to handle identification, authentication, and authorization in intelligent ambients. The resulting approach takes into account practical issues, such as resource limitation, bandwidth optimization, and scalability
- âŠ