1,187 research outputs found

    A Method for Dynamically Selecting the Best Frequency Hopping Technique in Industrial Wireless Sensor Network Applications

    Get PDF
    Industrial wireless applications often share the communication channel with other wireless technologies and communication protocols. This coexistence produces interferences and transmission errors which require appropriate mechanisms to manage retransmissions. Nevertheless, these mechanisms increase the network latency and overhead due to the retransmissions. Thus, the loss of data packets and the measures to handle them produce an undesirable drop in the QoS and hinder the overall robustness and energy efficiency of the network. Interference avoidance mechanisms, such as frequency hopping techniques, reduce the need for retransmissions due to interferences but they are often tailored to specific scenarios and are not easily adapted to other use cases. On the other hand, the total absence of interference avoidance mechanisms introduces a security risk because the communication channel may be intentionally attacked and interfered with to hinder or totally block it. In this paper we propose a method for supporting the design of communication solutions under dynamic channel interference conditions and we implement dynamic management policies for frequency hopping technique and channel selection at runtime. The method considers several standard frequency hopping techniques and quality metrics, and the quality and status of the available frequency channels to propose the best combined solution to minimize the side effects of interferences. A simulation tool has been developed and used in this work to validate the method.Research partially supported by the European Union's Seventh Framework Programme for research, technological development and demonstration under Grant Agreement Number FP7-SEC-2013-1/607292 ZONeSEC-Towards a EU framework for the security of Widezones, in the scope of the activities related to develop technologies that foster the Plug, Play&Forget paradigm. Also partially supported by the Department of Education, Universities and Research of the Basque Government under Grant IT980-16 and the Spanish Research Council, under grant TIN2016-79897-P

    Mobile device wardriving tools’ comparison: Nuku’alofa as case study

    Get PDF
    This paper describes the justification for a project to assess the security status of wireless networks usage in Nuku’alofa, the CBD of Tonga, By War Driving these suburbs, actual data was gathered to indicate the security status of wireless networks and provide an understanding of the users’ level of awareness and attitudes towards wireless security. This paper also takes the opportunity to compare the performance of the War driving tools that this study employed – GMoN, SWardriving, and Wi-Fi Scan. Wireless network communication remains a challenging and critical issue. This study takes an exploratory approach in which it allows the researcher to explore and dig deeper in to the data to find out the true status of wireless network security in Tonga. Not only that, it also allows the researcher to compare the performance of the tools based on the data. The results are very interesting, they indicate that, since the introduction of the fibre optic network, the usage of wireless communication technology grows as well. However, it is evident that wireless network security is still in its early stages. WEP encryption method is still in use, 24.2% with no encryption, and 9.2% did not change their SSID. In terms of tools’ performances, it is evident in this study that the SWardriving tool outperforms the GMoN and the Wi-Fi Scan tool

    A Survey of Different Dos Attacks on Wireless Network

    Get PDF
    Wireless technologies like Wireless LAN (WLAN) 802.11 picking up ubiquity in all associations, undertakings and colleges because of its profitability, cost sparing when contrasted with wired system and usability by enabling the system clients to move physically while keeping up an association with the wireless system. Wireless systems are main stream among the Laptop client group today in light of the portability and usability. Individuals working through remote association must know about the surroundings because of the different sorts of assaults made by the interlopers. Remote systems are extremely defenseless against (Denial of Service) DoS attacks. DoS attacks are an endeavor to make a machine or system asset inaccessible to its clients. It can happen in numerous layers of OSI demonstrate and can happen in different frame Network clients can ensure their frameworks with Wi-Fi Protected Access (WPA) security conventions and Wired Equivalent Privacy (WEP), however DoS attack still can't be averted utilizing these conventions. These attacks bring about debasement of the system quality or finish loss of accessibility of the system inside the association. This survey paper makes a review on various kinds of DoS attacks and their countermeasures on the framework systems which depend on the Access Points (AP). The fundamental assaults called Deauthentication and Disassociation Flooding. DoS assaults are considered there avoidance/discovery arrangements. Keywords- Access Points, DoS, Wireless Security, 802.11, Disassociation, Deauthentication, Flooding attack

    How Well Sensing Integrates with Communications in MmWave Wi-Fi?

    Full text link
    The development of integrated sensing and communication (ISAC) systems has recently gained interest for its ability to offer a variety of services including resources sharing and new applications, for example, localization, tracking, and health care related. While the sensing capabilities are offered through many technologies, rending to their wide deployments and the high frequency spectrum they provide and high range resolution, its accessibility through the Wi-Fi networks IEEE 802.11ad and 802.11ay has been getting the interest of research and industry. Even though there is a dedicated standardization body, namely the 802.11bf task group, working on enhancing the Wi-Fi sensing performance, investigations are needed to evaluate the effectiveness of various sensing techniques. In this project, we, in addition to surveying related literature, we evaluate the sensing performance of the millimeter wave (mmWave) Wi-Fi systems by simulating a scenario of a human target using Matlab simulation tools. In this analysis, we processed channel estimation data using the short time Fourier transform (STFT). Furthermore, using a channel variation threshold method, we evaluated the performance while reducing feedback. Our findings indicate that using STFT window overlap can provide good tracking results, and that the reduction in feedback measurements using 0.05 and 0.1 threshold levels reduces feedback measurements by 48% and 77%, respectively, without significantly degrading performance.Comment: arXiv admin note: substantial text overlap with arXiv:2207.04859 by other author

    Performance of wireless local area networks in Malaysian institutions

    Get PDF
    Although Wireless Local Area Networks (WLANs) are widely used in many settings little work has been done in studying their impact and benefits. This study provides empirical indicators on the performance of the WLANs implemented on Malaysian Institutions of Higher Learning Our research adopted Deming’s P-D-C-A Model and modified it to Plan-Implement-Control-Evaluate (P-I-C-E) in establishing a performance measurement for a WLAN; hence WLAN Performance Index (WPi). The measurement consists of four key performance indicators (KPi), reflecting the performance of the four P-I-C-E dimensions. These performance indicators provide a guide for the institutions to take the necessary corrective and preventive actions in attaining an effective WLAN system. Benchmarking was conducted by comparing three institutions in identifying the best WLAN system measures. The WPi is then applied to the three Malaysian public institutions of higher learning (MIPTA), which have implemented such WLAN system. The study reveals the WPi of each of the MIPTA being measured, indicating the strength and weaknesses of each institutions. Also, we suggest corrective actions necessary in achieving an effective and efficient WLAN system. Gap analysis was done to the three MIPTAs findings comparative to the benchmarked WLAN system
    corecore