82,993 research outputs found
A systematic literature review of cyberwarfare and state-sponsored hacking teams
It is expected that the creation of next-generation wireless networks would
result in the availability of high-speed and low-latency connectivity for every
part of our life. As a result, it is important that the network is secure. The
network's security environment has grown more complicated as a result of the
growing number of devices and the diversity of services that 5G will provide.
This is why it is important that the development of effective security
solutions is carried out early. Our findings of this review have revealed the
various directions that will be pursued in the development of next-generation
wireless networks. Some of these include the use of Artificial Intelligence and
Software Defined Mobile Networks. The threat environment for 5G networks,
security weaknesses in the new technology paradigms that 5G will embrace, and
provided solutions presented in the key studies in the field of 5G cyber
security are all described in this systematic literature review for prospective
researchers. Future research directions to protect wireless networks beyond 5G
are also covered.Comment: 3 figure
Authentication problems and access optimization to information wifi networks
Ensuring security presents a thorny problem because communication in a wireless network uses a shared medium without the benefit of a physical security perimeter. To address this problem wireless security protocols use cryptographic techniques to protect the network but the results have not always been successful. Serious flaws have been discovered in the design, implementation and operation of widely deployed wireless security protocols and attacks developed to exploit these flaws. Our investigation adopts the viewpoint of a hostile adversary to identify and exploit vulnerabilities that remain in wireless security protocols. Purpose-written software tools have been created to facilitate the investigation, conduct attacks and assist in the identification of the underlying causes of the security flaws. Remedial measures are then proposed, implemented and evaluated for the most serious threats. This method is applied to an investigation of the security problems present in both current Land Mobile Radio (LMR) systems and next-generation wireless mesh networks
Handoff Management: A Critical Function in Mobility Management for Fourth Generation (4G) Wireless Networks
Efficient mobility management techniques are critical to the success of next-generation wireless systems. Handoff management, which is one of the two basic functions of mobility management, has become more critical in fourth generation wireless networks which support multimedia services. The paper treats basic issues involved in handoff management aspect of general mobility management in wireless communication systems. The relevance of mobility management, handoff management, and general mobility management protocols are explained. The taxonomy of handoff mechanisms, causes of delays in handoffs, and security in handoff procedures are elicited. The paper concludes highlighting some open areas of research in providing seamless services
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
Mobility Management, Quality of Service, and Security in the Design of Next Generation Wireless Network
The next generation wireless network needs to provide seamless roaming among various access technologies in a heterogeneous environment. In allowing users to access any system at anytime and anywhere, the performance of mobility-enabled protocols is important. While Mobile IPv6 is generally used to support macro-mobility, integrating Mobile IPv6 with Session Initiation Protocol (SIP) to support IP traffic will lead to improved mobility performance. Advanced resource management techniques will ensure Quality of Service (QoS) during real-time mobility within the Next Generation Network (NGN) platform. The techniques may use a QoS Manager to allow end-to-end coordination and adaptation of Quality of Service. The function of the QoS Manager also includes dynamic allocation of resources during handover. Heterogeneous networks raise many challenges in security. A security entity can be configured within the QoS Manager to allow authentication and to maintain trust relationships in order to minimize threats during system handover. The next generation network needs to meet the above requirements of mobility, QoS, and security
Telecommunication Systems
This book is based on both industrial and academic research efforts in which a number of recent advancements and rare insights into telecommunication systems are well presented. The volume is organized into four parts: "Telecommunication Protocol, Optimization, and Security Frameworks", "Next-Generation Optical Access Technologies", "Convergence of Wireless-Optical Networks" and "Advanced Relay and Antenna Systems for Smart Networks." Chapters within these parts are self-contained and cross-referenced to facilitate further study
- …