2,036 research outputs found

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Near-Instantaneously Adaptive HSDPA-Style OFDM Versus MC-CDMA Transceivers for WIFI, WIMAX, and Next-Generation Cellular Systems

    No full text
    Burts-by-burst (BbB) adaptive high-speed downlink packet access (HSDPA) style multicarrier systems are reviewed, identifying their most critical design aspects. These systems exhibit numerous attractive features, rendering them eminently eligible for employment in next-generation wireless systems. It is argued that BbB-adaptive or symbol-by-symbol adaptive orthogonal frequency division multiplex (OFDM) modems counteract the near instantaneous channel quality variations and hence attain an increased throughput or robustness in comparison to their fixed-mode counterparts. Although they act quite differently, various diversity techniques, such as Rake receivers and space-time block coding (STBC) are also capable of mitigating the channel quality variations in their effort to reduce the bit error ratio (BER), provided that the individual antenna elements experience independent fading. By contrast, in the presence of correlated fading imposed by shadowing or time-variant multiuser interference, the benefits of space-time coding erode and it is unrealistic to expect that a fixed-mode space-time coded system remains capable of maintaining a near-constant BER

    Link level modelling techniques for analysing the configuration of link adaptation algorithms in mobile radio networks

    Get PDF
    The operation of Link Adaptation algorithms is based on channel quality estimates. It is therefore important to analyse the performance of such algorithms with link level models that properly capture the channel conditions and dynamics. Previous research [1] concluded that the use of simple link level models does not give an accurate prediction of the estimated performance of Link Adaptation algorithms. Following this previous work, this paper shows that the link level model considered for the study of Link Adaptation algorithms can also influence the decisions regarding the optimum configuration of the algorithm

    Robust Sensor Networks in Homes via Reactive Channel Hopping

    Get PDF
    Home area networks (HANs) consisting of wireless sensors have emerged as the enabling technology for important applications such as smart energy and assisted living. A key challenge faced in deploying robust wireless sensor networks (WSNs) for home automation applications is the need to provide long-term, reliable operation in the face of the varied sources of interference found in typical residential settings. To better understand the channel dynamics in these environments, we performed an in-depth empirical study of the performance of HANs in ten real-life apartments. Our empirical study leads to several key insights into designing robust HANs for residential environments. For example, we discover that there is not always a persistently good channel over 24 hours in many apartments; that reliability is strongly correlated across adjacent channels; and that interference does not exhibit cyclic behavior at daily or weekly timescales. Nevertheless, reliability can be maintained through a small number of channel hops. Based on these insights, we propose Adaptive and Robust Channel Hopping (ARCH) protocol, a lightweight receiver-oriented protocol which handles the dynamics of residential environments by reactively channel hopping when channel conditions have degraded. We evaluate our approach through a series of simulations based on real data traces as well as a testbed deployment in real-world apartments. Our results demonstrate that ARCH can reduce the number of packet retransmissions by a median of 42.3% compared to using a single, fixed wireless channel, and can enable up to a 2.2 X improvement in delivery rate on the most unreliable links in our experiment. Due to ARCH\u27s lightweight reactive design, this improvement in reliability is achieved with an average of 6 or fewer channel hops per link per day

    Dynamic Channel Access Scheme for Interference Mitigation in Relay-assisted Intra-WBANs

    Full text link
    This work addresses problems related to interference mitigation in a single wireless body area network (WBAN). In this paper, We propose a distributed \textit{C}ombined carrier sense multiple access with collision avoidance (CSMA/CA) with \textit{F}lexible time division multiple access (\textit{T}DMA) scheme for \textit{I}nterference \textit{M}itigation in relay-assisted intra-WBAN, namely, CFTIM. In CFTIM scheme, non interfering sources (transmitters) use CSMA/CA to communicate with relays. Whilst, high interfering sources and best relays use flexible TDMA to communicate with coordinator (C) through using stable channels. Simulation results of the proposed scheme are compared to other schemes and consequently CFTIM scheme outperforms in all cases. These results prove that the proposed scheme mitigates interference, extends WBAN energy lifetime and improves the throughput. To further reduce the interference level, we analytically show that the outage probability can be effectively reduced to the minimal.Comment: 2015 IEEE International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), Paris, France. arXiv admin note: text overlap with arXiv:1602.0865

    Fuzzy Logic Control of Adaptive ARQ for Video Distribution over a Bluetooth Wireless Link

    Get PDF
    Bluetooth's default automatic repeat request (ARQ) scheme is not suited to video distribution resulting in missed display and decoded deadlines. Adaptive ARQ with active discard of expired packets from the send buffer is an alternative approach. However, even with the addition of cross-layer adaptation to picture-type packet importance, ARQ is not ideal in conditions of a deteriorating RF channel. The paper presents fuzzy logic control of ARQ, based on send buffer fullness and the head-of-line packet's deadline. The advantage of the fuzzy logic approach, which also scales its output according to picture type importance, is that the impact of delay can be directly introduced to the model, causing retransmissions to be reduced compared to all other schemes. The scheme considers both the delay constraints of the video stream and at the same time avoids send buffer overflow. Tests explore a variety of Bluetooth send buffer sizes and channel conditions. For adverse channel conditions and buffer size, the tests show an improvement of at least 4 dB in video quality compared to nonfuzzy schemes. The scheme can be applied to any codec with I-, P-, and (possibly) B-slices by inspection of packet headers without the need for encoder intervention.</jats:p

    Supervisory Wireless Control for Critical Industrial Applications

    Get PDF
    • …
    corecore