11,496 research outputs found

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    NASA and the challenge of ISDN: The role of satellites in an ISDN world

    Get PDF
    To understand what role satellites may play in Integrated Services Digital Network (ISDN), it is necessary to understand the concept of ISDN, including key organizations involved, the current status of key standards recommendations, and domestic and international progress implementation of ISDN. Each of these areas are explained. A summary of the technical performance criteria for ISDN, current standards for satellites in ISDN, key players in the ISDN environment, and what steps can be taken to encourage application of satellites in ISDN are also covered

    Design And Development Of A Secure Wireless System Using Frequency Hopping Spread Spectrum [TK5103.2. A148 2007 f rb].

    Get PDF
    Dalam penyelidikan ini, satu sistem tanpa wayar automasi untuk menghantar data yang bersertakan kod PN secara automatik kepada pihak berkuasa berkenaan telah dibangunkan. In this research, an automated wireless system that sends the data accompanied with PN code automatically to the concerned authorities has been developed

    Compendium of Applications Technology Satellite user experiments

    Get PDF
    The achievements of the user experiments performed with ATS satellites from 1967 to 1973 are summarized. Included are fixed and mobile point to point communications experiments involving voice, teletype and facsimile transmissions. Particular emphasis is given to the Alaska and Hawaii satellite communications experiments. The use of the ATS satellites for ranging and position fixing of ships and aircraft is also covered. The structure and operating characteristics of the various ATS satellite are briefly described

    SOWER: Self-­Organizing Wireless Network for Messaging

    Get PDF
    Short Message Service (SMS) has become extremely popular in many countries, and represents a multi-billion dollars market. Yet many consumers consider that the price cellular network operators charge for it is too high. In this paper, we explain that there exist alternatives to cellular networks for the provision of SMS. In particular, we present the Self-Organizing Wireless messaging nEtwoRk (SOWER), an all-wireless network operable in cities. In SOWER, each user installs a wireless, power-plugged, device at home and communicates by means of a mobile device. Based on our experimental measurements of IEEE 802.11 equipped devices, we show the feasibility of the concept in various urban scenarios. We also show that city-wide connectivity can be achieved even with a limited market penetration. We propose an appropriate routing protocol, and we explain that the capacity of such networks is sufficient to support messaging communication

    Information techniques for irrigation systems: Selected proceedings of the Second International Network Meeting on Information Techniques for Irrigation Systems held in Lahore/Bahawalnagar, Pakistan, 5-8 December 1994

    Get PDF
    Irrigation management / Irrigation systems / Decision support tools / Decision making / Information systems / Computer techniques / Models / Water management / Malaysia / Pakistan / Sri Lanka

    Technology as an economic catalyst in rural and depressed places in Massachusetts

    Get PDF
    This paper uses case studies, including two cities (Lynn and New Bedford), a sub-city district (Roxbury) and two towns in rural Franklin County (Greenfield and Orange), to examine the role of technology as a potential economic catalyst in rural and depressed places in Massachusetts. Though the five target areas vary in size, density, geographic area, demographic characteristics and economic resources, each exhibits chronic patterns of economic distress related to the decline of manufacturing, construction and other key industries

    Final report on the evaluation of RRM/CRRM algorithms

    Get PDF
    Deliverable public del projecte EVERESTThis deliverable provides a definition and a complete evaluation of the RRM/CRRM algorithms selected in D11 and D15, and evolved and refined on an iterative process. The evaluation will be carried out by means of simulations using the simulators provided at D07, and D14.Preprin

    Collaborative Edge Computing in Mobile Internet of Things

    Get PDF
    The proliferation of Internet-of-Things (IoT) devices has opened a plethora of opportunities for smart networking, connected applications and data driven intelligence. The large distribution of IoT devices within a finite geographical area and the pervasiveness of wireless networking present an opportunity for such devices to collaborate. Centralized decision systems have so far dominated the field, but they are starting to lose relevance in the wake of heterogeneity of the device pool. This thesis is driven by three key hypothesis: (i) In solving complex problems, it is possible to harness unused compute capabilities of the device pool instead of always relying on centralized infrastructures; (ii) When possible, collaborating with neighbors to identify security threats scales well in large environments; (iii) Given the abundance of data from a large pool of devices with possible privacy constraints, collaborative learning drives scalable intelligence. This dissertation defines three frameworks for these hypotheses; collaborative computing, collaborative security and collaborative privacy intelligence. The first framework, Opportunistic collaboration among IoT devices for workload execution, profiles applications and matches resource grants to requests using blockchain to put excess capacity at the edge to good use. The evaluation results show app execution latency comparable to the centralized edge and an outstanding resource utilization at the edge. The second framework, Integrity Threat Identification for Distributed IoT, uses a new spatio-temporal algorithm, based on Local Outlier Factor (LOF) uniquely using mean and variance collaboratively across spatial and temporal dimensions to identify potential threats. Evaluation results on real world underground sensor dataset (Thoreau) show good accuracy and efficiency. The third frame- work, Collaborative Privacy Intelligence, aims to understand privacy invasion by reverse engineering a user’s privacy model using sensors data, and score the level of intrusion for various dimensions of privacy. By having sensors track activities, and learning rule books from the collective insights, we are able to predict ones privacy attributes and states, with reasonable accuracy. As the Edge gains more prominence with computation moving closer to the data source, the above frameworks will drive key solutions and research in areas of Edge federation and collaboration
    corecore