1,090 research outputs found
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
How Physicality Enables Trust: A New Era of Trust-Centered Cyberphysical Systems
Multi-agent cyberphysical systems enable new capabilities in efficiency,
resilience, and security. The unique characteristics of these systems prompt a
reevaluation of their security concepts, including their vulnerabilities, and
mechanisms to mitigate these vulnerabilities. This survey paper examines how
advancement in wireless networking, coupled with the sensing and computing in
cyberphysical systems, can foster novel security capabilities. This study
delves into three main themes related to securing multi-agent cyberphysical
systems. First, we discuss the threats that are particularly relevant to
multi-agent cyberphysical systems given the potential lack of trust between
agents. Second, we present prospects for sensing, contextual awareness, and
authentication, enabling the inference and measurement of ``inter-agent trust"
for these systems. Third, we elaborate on the application of quantifiable trust
notions to enable ``resilient coordination," where ``resilient" signifies
sustained functionality amid attacks on multiagent cyberphysical systems. We
refer to the capability of cyberphysical systems to self-organize, and
coordinate to achieve a task as autonomy. This survey unveils the cyberphysical
character of future interconnected systems as a pivotal catalyst for realizing
robust, trust-centered autonomy in tomorrow's world
DeepCSI: Rethinking Wi-Fi Radio Fingerprinting Through MU-MIMO CSI Feedback Deep Learning
We present DeepCSI, a novel approach to Wi-Fi radio fingerprinting (RFP)
which leverages standard-compliant beamforming feedback matrices to
authenticate MU-MIMO Wi-Fi devices on the move. By capturing unique
imperfections in off-the-shelf radio circuitry, RFP techniques can identify
wireless devices directly at the physical layer, allowing low-latency
low-energy cryptography-free authentication. However, existing Wi-Fi RFP
techniques are based on software-defined radio (SDRs), which may ultimately
prevent their widespread adoption. Moreover, it is unclear whether existing
strategies can work in the presence of MU-MIMO transmitters - a key technology
in modern Wi-Fi standards. Conversely from prior work, DeepCSI does not require
SDR technologies and can be run on any low-cost Wi-Fi device to authenticate
MU-MIMO transmitters. Our key intuition is that imperfections in the
transmitter's radio circuitry percolate onto the beamforming feedback matrix,
and thus RFP can be performed without explicit channel state information (CSI)
computation. DeepCSI is robust to inter-stream and inter-user interference
being the beamforming feedback not affected by those phenomena. We extensively
evaluate the performance of DeepCSI through a massive data collection campaign
performed in the wild with off-the-shelf equipment, where 10 MU-MIMO Wi-Fi
radios emit signals in different positions. Experimental results indicate that
DeepCSI correctly identifies the transmitter with an accuracy of up to 98%. The
identification accuracy remains above 82% when the device moves within the
environment. To allow replicability and provide a performance benchmark, we
pledge to share the 800 GB datasets - collected in static and, for the first
time, dynamic conditions - and the code database with the community.Comment: To be presented at the 42nd IEEE International Conference on
Distributed Computing Systems (ICDCS), Bologna, Italy, July 10-13, 202
Best Effort versus Spectrum Markets: Wideband and Wi-Fi versus 3G MVNOs?
This paper asks is whether (i) 3rd generation wireless services, as embodied in the
planned and soon to be offered services emerging first in Asia and Europe, or (ii) the
unlicensed wireless services such as 802.11 or wi-fi but also including more advanced
wideband and ultrawideband (UWB) services which are being experimented with
primarily in North America, offer more compelling visions for advanced wireless
services. we conclude that secondary spectrum markets are important for the viability of
the 3G industry, and not only for reasons of efficiency. One large difference between 2G
and 3G networks, observed in our models, was that voice services alone would not
generate sufficient revenues for a 3G system. License holders which up to now have
concentrated on selling a single product, will need to develop a much larger range of
advanced applications, which will have to be marketed and packaged in different ways
for different market segments
New Waves of IoT Technologies Research – Transcending Intelligence and Senses at the Edge to Create Multi Experience Environments
The next wave of Internet of Things (IoT) and Industrial Internet of Things (IIoT) brings new technological developments that incorporate radical advances in Artificial Intelligence (AI), edge computing processing, new sensing capabilities, more security protection and autonomous functions accelerating progress towards the ability for IoT systems to self-develop, self-maintain and self-optimise. The emergence of hyper autonomous IoT applications with enhanced sensing, distributed intelligence, edge processing and connectivity, combined with human augmentation, has the potential to power the transformation and optimisation of industrial sectors and to change the innovation landscape. This chapter is reviewing the most recent advances in the next wave of the IoT by looking not only at the technology enabling the IoT but also at the platforms and smart data aspects that will bring intelligence, sustainability, dependability, autonomy, and will support human-centric solutions.acceptedVersio
Implementing Data-Driven Smart City Applications for Future Cities
Cities are investing in data-driven smart technologies to improve performance and efficiency and to generate a vast amount of data. Finding the opportunities to innovatively use this data help governments and authorities to forecast, respond, and plan for future scenarios. Access to real-time data and information can provide effective services that improve productivity, resulting in environmental, social, and economic benefits. It also assists in the decision-making process and provides opportunities for community engagement and participation by improving digital literacy and culture. This paper aims to review and analyze current practices of data-driven smart applications that contribute to the smooth functioning of urban city systems and the problems they face. The research methodology is qualitative: a systematic and extensive literature review carried out by PRISMA method. Data and information from different case studies carried out globally assisted in the inductive approach. Content analysis identified smart city indicators and related criteria in the case study examples. The study concluded that smart people, smart living, and smart governance methods that have come into practice at a later stage are as important as smart mobility, smart environments, and smart economy measures that were implemented early on, and cities are opening up to new, transparent participatory governance approaches where citizens play a key role. It also illustrates that the current new wave of smart cities with real time data are promoting citizen participation focusing on human, social capital as an essential component in future cities
A-UAV: Application-Aware Content and Network Optimization of Edge-Assisted UAV Systems
To perform advanced surveillance, Unmanned Aerial Vehicles (UAVs) require the
execution of edge-assisted computer vision (CV) tasks. In multi-hop UAV
networks, the successful transmission of these tasks to the edge is severely
challenged due to severe bandwidth constraints. For this reason, we propose a
novel A-UAV framework to optimize the number of correctly executed tasks at
the edge. In stark contrast with existing art, we take an application-aware
approach and formulate a novel pplication-Aware Task Planning Problem
(A-TPP) that takes into account (i) the relationship between deep neural
network (DNN) accuracy and image compression for the classes of interest based
on the available dataset, (ii) the target positions, (iii) the current
energy/position of the UAVs to optimize routing, data pre-processing and target
assignment for each UAV. We demonstrate A-TPP is NP-Hard and propose a
polynomial-time algorithm to solve it efficiently. We extensively evaluate
A-UAV through real-world experiments with a testbed composed by four DJI
Mavic Air 2 UAVs. We consider state-of-the-art image classification tasks with
four different DNN models (i.e., DenseNet, ResNet152, ResNet50 and
MobileNet-V2) and object detection tasks using YoloV4 trained on the ImageNet
dataset. Results show that A-UAV attains on average around 38% more
accomplished tasks than the state-of-the-art, with 400% more accomplished tasks
when the number of targets increases significantly. To allow full
reproducibility, we pledge to share datasets and code with the research
community.Comment: Accepted to INFOCOM 202
Recommended from our members
Urban Digital Divides and Community WiFi: A Case Study of Red Hook, Brooklyn
As a research area, the scholarship on the digital divide has largely focused on the difference in internet access and availability between urban and rural sites. The proposed research endeavor investigates the digital divide within urban areas to understand the linkages between resiliency, information and communication technologies (ICT), and the field of urban planning. Using GIS visualization and a case study approach, this thesis examines internet access and availability within New York City. The GIS visualization draws upon public sources of data to map areas with low internet penetration within the study area. The case study approach involves interviews with members of Red Hook WiFi, an organization in Red Hook, Brooklyn that is working to address the digital divide through training and community outreach. Using this mixed-methods approach, several conclusions came to light: 1) that the urban digital divide aligns with the theoretical understanding of it as "pockets of inclusion and exclusion" with a socio-economic underpinning, as reported in the literature; 2) current and planned initiatives to address this divide are not sufficient; and 3) the community developed and owned WiFi network has enabled key resiliency capacities that need to be built upon. Given these conclusions, this study concludes by discussing the role that urban planning can play in fostering more resilient communities by becoming engaged in broadband planning and also offers recommendations for city agencies, local organizations, and planners themselves
- …