583 research outputs found
Survey and Systematization of Secure Device Pairing
Secure Device Pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet
of Things (IoT) devices. Comparison and assessment of SDP schemes is
troublesome, because each scheme makes different assumptions about out-of-band
channels and adversary models, and are driven by their particular use-cases. A
conceptual model that facilitates meaningful comparison among SDP schemes is
missing. We provide such a model. In this article, we survey and analyze a wide
range of SDP schemes that are described in the literature, including a number
that have been adopted as standards. A system model and consistent terminology
for SDP schemes are built on the foundation of this survey, which are then used
to classify existing SDP schemes into a taxonomy that, for the first time,
enables their meaningful comparison and analysis.The existing SDP schemes are
analyzed using this model, revealing common systemic security weaknesses among
the surveyed SDP schemes that should become priority areas for future SDP
research, such as improving the integration of privacy requirements into the
design of SDP schemes. Our results allow SDP scheme designers to create schemes
that are more easily comparable with one another, and to assist the prevention
of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications
Surveys & Tutorials 2017 (Volume: PP, Issue: 99
An RFID Anti-Collision Algorithm Assisted by Multi-Packet Reception and Retransmission Diversity
RFID provides a way to connect the real world to the virtual world. An RFID tag can link a physical entity like a location, an object, a plant, an animal, or a human being to its avatar which belongs to a global information system. For instance, let's consider the case of an RFID tag attached to a tree. The tree is the physical entity. Its avatar can contain the type of the tree, the size of its trunk, and the list of actions a gardener took on it
Adjoining Internet of Things with Data Mining : A Survey
The Interactive Data Corporative (IDC) conjectures that by 2025 the worldwide data circle will develop to 163ZB (that is a trillion gigabytes) which is ten times the 16.1ZB of information produced in 2016. The Internet of Things is one of the hot topics of this living century and researchers are heading for mass adoption 2019 driven by better than-expected business results. This information will open one of a kind of user experience and another universe of business opening. The huge information produced by the Internet of Things (IoT) are considered of high business esteem, and information mining calculations can be connected to IoT to extract hidden data from information. This paper concisely discusses the work done in sequential manner of time in different fields of IOT along with its outcome and research gap. This paper also discusses the various aspects of data mining functionalities with IOT. The recommendation for the Challenges in IOT that can be adopted for betterment is given. Finally, this paper presents the vision for how IOT will have impact on changing the distant futur
Routing Optimization in Vehicular Networks: A New Approach Based on Multiobjective Metrics and Minimum Spanning Tree
Recently, distributed mobile wireless computing is becoming a very important communications paradigm, due to its flexibility to adapt to different mobile applications. As many other distributed networks, routing operations assume a crucial importance in system optimization, especially when considering dense urban areas, where interference effects cannot be neglected. In this paper a new routing protocol for VANETs and a new scheme of multichannel management are proposed. In particular, an interference-aware routing scheme, for multiradio vehicular networks, wherein each node is equipped with a multichannel radio interface is investigated. NS-2 has been used to validate the proposed Multiobjective routing protocol (MO-RP) protocol in terms of packet delivery ratio, throughput, end-to-end delay, and overhead
Location-Enabled IoT (LE-IoT): A Survey of Positioning Techniques, Error Sources, and Mitigation
The Internet of Things (IoT) has started to empower the future of many
industrial and mass-market applications. Localization techniques are becoming
key to add location context to IoT data without human perception and
intervention. Meanwhile, the newly-emerged Low-Power Wide-Area Network (LPWAN)
technologies have advantages such as long-range, low power consumption, low
cost, massive connections, and the capability for communication in both indoor
and outdoor areas. These features make LPWAN signals strong candidates for
mass-market localization applications. However, there are various error sources
that have limited localization performance by using such IoT signals. This
paper reviews the IoT localization system through the following sequence: IoT
localization system review -- localization data sources -- localization
algorithms -- localization error sources and mitigation -- localization
performance evaluation. Compared to the related surveys, this paper has a more
comprehensive and state-of-the-art review on IoT localization methods, an
original review on IoT localization error sources and mitigation, an original
review on IoT localization performance evaluation, and a more comprehensive
review of IoT localization applications, opportunities, and challenges. Thus,
this survey provides comprehensive guidance for peers who are interested in
enabling localization ability in the existing IoT systems, using IoT systems
for localization, or integrating IoT signals with the existing localization
sensors
Millimeter-wave Wireless LAN and its Extension toward 5G Heterogeneous Networks
Millimeter-wave (mmw) frequency bands, especially 60 GHz unlicensed band, are
considered as a promising solution for gigabit short range wireless
communication systems. IEEE standard 802.11ad, also known as WiGig, is
standardized for the usage of the 60 GHz unlicensed band for wireless local
area networks (WLANs). By using this mmw WLAN, multi-Gbps rate can be achieved
to support bandwidth-intensive multimedia applications. Exhaustive search along
with beamforming (BF) is usually used to overcome 60 GHz channel propagation
loss and accomplish data transmissions in such mmw WLANs. Because of its short
range transmission with a high susceptibility to path blocking, multiple number
of mmw access points (APs) should be used to fully cover a typical target
environment for future high capacity multi-Gbps WLANs. Therefore, coordination
among mmw APs is highly needed to overcome packet collisions resulting from
un-coordinated exhaustive search BF and to increase the total capacity of mmw
WLANs. In this paper, we firstly give the current status of mmw WLANs with our
developed WiGig AP prototype. Then, we highlight the great need for coordinated
transmissions among mmw APs as a key enabler for future high capacity mmw
WLANs. Two different types of coordinated mmw WLAN architecture are introduced.
One is the distributed antenna type architecture to realize centralized
coordination, while the other is an autonomous coordination with the assistance
of legacy Wi-Fi signaling. Moreover, two heterogeneous network (HetNet)
architectures are also introduced to efficiently extend the coordinated mmw
WLANs to be used for future 5th Generation (5G) cellular networks.Comment: 18 pages, 24 figures, accepted, invited paper
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
- …