2,036 research outputs found
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Near-Instantaneously Adaptive HSDPA-Style OFDM Versus MC-CDMA Transceivers for WIFI, WIMAX, and Next-Generation Cellular Systems
Burts-by-burst (BbB) adaptive high-speed downlink packet access (HSDPA) style multicarrier systems are reviewed, identifying their most critical design aspects. These systems exhibit numerous attractive features, rendering them eminently eligible for employment in next-generation wireless systems. It is argued that BbB-adaptive or symbol-by-symbol adaptive orthogonal frequency division multiplex (OFDM) modems counteract the near instantaneous channel quality variations and hence attain an increased throughput or robustness in comparison to their fixed-mode counterparts. Although they act quite differently, various diversity techniques, such as Rake receivers and space-time block coding (STBC) are also capable of mitigating the channel quality variations in their effort to reduce the bit error ratio (BER), provided that the individual antenna elements experience independent fading. By contrast, in the presence of correlated fading imposed by shadowing or time-variant multiuser interference, the benefits of space-time coding erode and it is unrealistic to expect that a fixed-mode space-time coded system remains capable of maintaining a near-constant BER
Link level modelling techniques for analysing the configuration of link adaptation algorithms in mobile radio networks
The operation of Link Adaptation algorithms is based on channel quality estimates. It is therefore important to analyse the performance of such algorithms with link level models that properly capture the channel conditions and dynamics. Previous research [1] concluded that the use of simple link level models does not give an accurate prediction of the estimated performance of Link Adaptation algorithms. Following this previous work, this paper shows that the link level model considered for the study of Link Adaptation algorithms can also influence the decisions regarding the optimum configuration of the algorithm
Robust Sensor Networks in Homes via Reactive Channel Hopping
Home area networks (HANs) consisting of wireless sensors have emerged as the enabling technology for important applications such as smart energy and assisted living. A key challenge faced in deploying robust wireless sensor networks (WSNs) for home automation applications is the need to provide long-term, reliable operation in the face of the varied sources of interference found in typical residential settings. To better understand the channel dynamics in these environments, we performed an in-depth empirical study of the performance of HANs in ten real-life apartments. Our empirical study leads to several key insights into designing robust HANs for residential environments. For example, we discover that there is not always a persistently good channel over 24 hours in many apartments; that reliability is strongly correlated across adjacent channels; and that interference does not exhibit cyclic behavior at daily or weekly timescales. Nevertheless, reliability can be maintained through a small number of channel hops. Based on these insights, we propose Adaptive and Robust Channel Hopping (ARCH) protocol, a lightweight receiver-oriented protocol which handles the dynamics of residential environments by reactively channel hopping when channel conditions have degraded. We evaluate our approach through a series of simulations based on real data traces as well as a testbed deployment in real-world apartments. Our results demonstrate that ARCH can reduce the number of packet retransmissions by a median of 42.3% compared to using a single, fixed wireless channel, and can enable up to a 2.2 X improvement in delivery rate on the most unreliable links in our experiment. Due to ARCH\u27s lightweight reactive design, this improvement in reliability is achieved with an average of 6 or fewer channel hops per link per day
Dynamic Channel Access Scheme for Interference Mitigation in Relay-assisted Intra-WBANs
This work addresses problems related to interference mitigation in a single
wireless body area network (WBAN). In this paper, We propose a distributed
\textit{C}ombined carrier sense multiple access with collision avoidance
(CSMA/CA) with \textit{F}lexible time division multiple access (\textit{T}DMA)
scheme for \textit{I}nterference \textit{M}itigation in relay-assisted
intra-WBAN, namely, CFTIM. In CFTIM scheme, non interfering sources
(transmitters) use CSMA/CA to communicate with relays. Whilst, high interfering
sources and best relays use flexible TDMA to communicate with coordinator (C)
through using stable channels. Simulation results of the proposed scheme are
compared to other schemes and consequently CFTIM scheme outperforms in all
cases. These results prove that the proposed scheme mitigates interference,
extends WBAN energy lifetime and improves the throughput. To further reduce the
interference level, we analytically show that the outage probability can be
effectively reduced to the minimal.Comment: 2015 IEEE International Conference on Protocol Engineering (ICPE) and
International Conference on New Technologies of Distributed Systems (NTDS),
Paris, France. arXiv admin note: text overlap with arXiv:1602.0865
Fuzzy Logic Control of Adaptive ARQ for Video Distribution over a Bluetooth Wireless Link
Bluetooth's default automatic repeat request (ARQ) scheme is not suited to video distribution resulting in missed display and decoded deadlines. Adaptive ARQ with active discard of expired packets from the send buffer is an alternative approach. However, even with the addition of cross-layer adaptation to picture-type packet importance, ARQ is not ideal in conditions of a deteriorating RF channel. The paper presents fuzzy logic control of ARQ, based on send buffer fullness and the head-of-line packet's deadline. The advantage of the fuzzy logic approach, which also scales its output according to picture type importance, is that the impact of delay can be directly introduced to the model, causing retransmissions to be reduced compared to all other schemes. The scheme considers both the delay constraints of the video stream and at the same time avoids send buffer overflow. Tests explore a variety of Bluetooth send buffer sizes and channel conditions. For adverse channel conditions and buffer size, the tests show an improvement of at least 4 dB in video quality compared to nonfuzzy schemes. The scheme can be applied to any codec with I-, P-, and (possibly) B-slices by inspection of packet headers without the need for encoder intervention.</jats:p
- …