6 research outputs found

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Optimal Channel-Switching Strategies in Multi-channel Wireless Networks.

    Full text link
    The dual nature of scarcity and under-utilization of spectrum resources, as well as recent advances in software-defined radio, led to extensive study on the design of transceivers that are capable of opportunistic channel access. By allowing users to dynamically select which channel(s) to use for transmission, the overall throughput performance and the spectrum utilization of the system can in general be improved, compared to one with a single channel or more static channel allocations. The reason for such improvement lies in the exploitation of the underlying temporal, spatial, spectral and congestion diversity. In this dissertation, we focus on the channel-switching/hopping decision of a (group of) legitimate user(s) in a multi-channel wireless communication system, and study three closely related problems: 1) a jamming defense problem against a no-regret learning attacker, 2) a jamming defense problem with minimax (worst-case) optimal channel-switching strategies, and 3) the throughput optimal strategies for a group of competing users in IEEE 802.11-like medium access schemes. For the first problem we study the interaction between a user and an attacker from a learning perspective, where an online learner naturally adapts to the available information on the adversarial environment over time, and evolves its strategy with certain payoff guarantee. We show how the user can counter a strong learning attacker with knowledge on its learning rationale, and how the learning technique can itself be considered as a countermeasure with no such prior information. We further consider in the second problem the worst-case optimal strategy for the user without prior information on the attacking pattern, except that the attacker is subject to a resource constraint, which models its energy consumption and replenishment process. We provide explicit characterization for the optimal strategies and show the most damaging attacker, interestingly, behaves randomly in an i.i.d. fashion. In the last problem, we consider a group of competing users in a non-adversarial setting. We place the interaction among users in the context of IEEE 802.11-like medium access schemes, and derive decentralized channel allocation for overall throughput improvement. We show the typically rule-of-thumb load balancing principle in spectrum resource sharing can be indeed throughput optimal.PhDElectrical Engineering: SystemsUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/108949/1/qingsi_1.pd
    corecore