5,287 research outputs found

    Security by Spatial Reference:Using Relative Positioning to Authenticate Devices for Spontaneous Interaction

    Get PDF
    Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices encountered in their environment in order to take advantage of interaction opportunities in accordance with their situation. However, it is difficult to secure spontaneous interaction as this requires authentication of the encountered device, in the absence of any prior knowledge of the device. In this paper we present a method for establishing and securing spontaneous interactions on the basis of emphspatial references that capture the spatial relationship of the involved devices. Spatial references are obtained by accurate sensing of relative device positions, presented to the user for initiation of interactions, and used in a peer authentication protocol that exploits a novel mechanism for message transfer over ultrasound to ensures spatial authenticity of the sender

    2nd Joint ERCIM eMobility and MobiSense Workshop

    Get PDF

    Location-Privacy Leakage and Integrated Solutions for 5G Cellular Networks and Beyond

    Get PDF
    The fifth generation (5G) of cellular networks improves the precision of user localization and provides the means to disclose location information to over-the-top (OTT) service providers. The network data analytics function (NWDAF) can further elaborate this information at an aggregated level using artificial intelligence techniques. These powerful features may lead to the improper use of user location information by mobile network operators (MNOs) and OTT service providers. Moreover, vulnerabilities at various layers may also leak user location information to eavesdroppers. Hence, the privacy of users is likely at risk, as location is part of their sensitive data. In this paper, we first go through the evolution of localization in cellular networks and investigate their effects on location privacy. Then, we propose a location-privacy-preserving integrated solution comprising virtual private mobile networks, an independent authentication and billing authority, and functions to protect wireless signals against location information leakage. Moreover, we advocate the continuous and detailed control of localization services by the user

    Securing NextG networks with physical-layer key generation: A survey

    Get PDF
    As the development of next-generation (NextG) communication networks continues, tremendous devices are accessing the network and the amount of information is exploding. However, with the increase of sensitive data that requires confidentiality to be transmitted and stored in the network, wireless network security risks are further amplified. Physical-layer key generation (PKG) has received extensive attention in security research due to its solid information-theoretic security proof, ease of implementation, and low cost. Nevertheless, the applications of PKG in the NextG networks are still in the preliminary exploration stage. Therefore, we survey existing research and discuss (1) the performance advantages of PKG compared to cryptography schemes, (2) the principles and processes of PKG, as well as research progresses in previous network environments, and (3) new application scenarios and development potential for PKG in NextG communication networks, particularly analyzing the effect and prospects of PKG in massive multiple-input multiple-output (MIMO), reconfigurable intelligent surfaces (RISs), artificial intelligence (AI) enabled networks, integrated space-air-ground network, and quantum communication. Moreover, we summarize open issues and provide new insights into the development trends of PKG in NextG networks

    Versatility Of Low-Power Wide-Area Network Applications

    Get PDF
    Low-Power Wide-Area Network (LPWAN) is regarded as the leading communication technology for wide-area Internet-of-Things (IoT) applications. It offers low-power, long-range, and low-cost communication. With different communication requirements for varying IoT applications, many competing LPWAN technologies operating in both licensed (e.g., NB-IoT, LTE-M, and 5G) and unlicensed (e.g., LoRa and SigFox) bands have emerged. LPWANs are designed to support applications with low-power and low data rate operations. They are not well-designed to host applications that involve high mobility, high traffic, or real-time communication (e.g., volcano monitoring and control applications).With the increasing number of mobile devices in many IoT domains (e.g., agricultural IoT and smart city), mobility support is not well-addressed in LPWAN. Cellular-based/licensed LPWAN relies on the wired infrastructure to enable mobility. On the other hand, most unlicensed LPWANs operate on the crowded ISM band or are required to duty cycle, making handling mobility a challenge. In this dissertation, we first identify the key opportunities of LPWAN, highlight the challenges, and show potential directions for future research. We then enable the versatility of LPWAN applications first by enabling applications involving mobility over LPWAN. Specifically, we propose to handle mobility in LPWAN over white space considering Sensor Network Over White Space (SNOW). SNOW is a highly scalable and energy-efficient LPWAN operating over the TV white spaces. TV white spaces are the allocated but locally unused available TV channels (54 - 698 MHz in the US). We proposed a dynamic Carrier Frequency Offset (CFO) estimation and compensation technique that considers the impact of the Doppler shift due to mobility. Also, we design energy-efficient and fast BS discovery and association approaches. Finally, we demonstrate the feasibility of our approach through experiments in different deployments. Finally, we present a collision detection and recovery technique called RnR (Reverse & Replace Decoding) that applies to LPWANs. Additionally, we discuss future work to enable handling burst transmission over LPWAN and localization in mobile LPWAN
    corecore