16,938 research outputs found

    Secure short-range communications

    Get PDF
    Analysts predict billions of everyday objects will soon become ``smart’\u27 after designers add wireless communication capabilities. Collectively known as the Internet of Things (IoT), these newly communication-enabled devices are envisioned to collect and share data among themselves, with new devices entering and exiting a particular environment frequently. People and the devices they wear or carry may soon encounter dozens, possibly hundreds, of devices each day. Many of these devices will be encountered for the first time. Additionally, some of the information the devices share may have privacy or security implications. Furthermore, many of these devices will have limited or non-existent user interfaces, making manual configuration cumbersome. This situation suggests that devices that have never met, nor shared a secret, but that are in the same physical area, must have a way to securely communicate that requires minimal manual intervention. In this dissertation we present novel approaches to solve these short-range communication issues. Our techniques are simple to use, secure, and consistent with user intent. We first present a technique called Wanda that uses radio strength as a communication channel to securely impart information onto nearby devices. We focus on using Wanda to introduce new devices into an environment, but Wanda could be used to impart any type of information onto wireless devices, regardless of device type or manufacturer. Next we describe SNAP, a method for a single-antenna wireless device to determine when it is in close physical proximity to another wireless device. Because radio waves are invisible, a user may believe transmissions are coming from a nearby device when in fact the transmissions are coming from a distant adversary attempting to trick the user into accepting a malicious payload. Our approach significantly raises the bar for an adversary attempting such a trick. Finally, we present a solution called JamFi that exploits MIMO antennas and the Inverse-Square Law to securely transfer data between nearby devices while denying more distant adversaries the ability to recover the data. We find JamFi is able to facilitate reliable and secure communication between two devices in close physical proximity, even though they have never met nor shared a key

    Device-to-device (D2D) reliable transmission in the internet of things

    Get PDF
    D2D stands for device-to-device communication, which is likely to perform a major impact in future mobile communications because it offers ultra-low latency for end user’s direct conversation. Throughout minimizing latency, increasing strength and improved transmission efficiency, and expanding telecommunication services, D2D services are seen as a successful innovation for emerging mobile communications. The D2D networking makes a unique contribution to the wireless world by simplifying data transfer among devices connected. D2D networking makes use of adjacent two nodes to maximize the use of existing infrastructure, low latency, boost throughput and expand service functionality. Within wireless networks, D2D communication is described as immediate interaction among two mobile devices without passing through the access point or network infrastructure. The fully integrated wireless communication would be built by integrating D2D and the Internet of Things. D2D enables the larger number of devices to be paired at a higher bandwidth frequency and with minimum latency. Building a new reliable framework for D2D communication of smart devices can be an important framework for improving the reliability of communication. Internet of Things is the process of communicating and sharing information between nearby devices. But there are many challenges to secure and reliable communication. Amongst the major concerns for wireless transmission has been identified as communication trust, and overcoming this issue could lead to sustained expansion in the usage and popularity of the Internet of Things. The proposed study develops a system for providing internet access to a network of smart devices connected to the internet of things. The significant contributions link the latest findings that incorporate the interaction framework's stability and provides secure internet networking for connected devices

    Safe and Secure Wireless Power Transfer Networks: Challenges and Opportunities in RF-Based Systems

    Full text link
    RF-based wireless power transfer networks (WPTNs) are deployed to transfer power to embedded devices over the air via RF waves. Up until now, a considerable amount of effort has been devoted by researchers to design WPTNs that maximize several objectives such as harvested power, energy outage and charging delay. However, inherent security and safety issues are generally overlooked and these need to be solved if WPTNs are to be become widespread. This article focuses on safety and security problems related WPTNs and highlight their cruciality in terms of efficient and dependable operation of RF-based WPTNs. We provide a overview of new research opportunities in this emerging domain.Comment: Removed some references, added new references, corrected typos, revised some sections (mostly I-B and III-C

    Survey and Systematization of Secure Device Pairing

    Full text link
    Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis.The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications Surveys & Tutorials 2017 (Volume: PP, Issue: 99
    corecore