246 research outputs found

    VirtuWind – Security in a Virtual and Programmable Industrial Network Prototype Deployed in an operational Wind Park

    Get PDF
    Ioannis Askoxylakis, Nikolaos Petroulakis, (FORTH), Vivek Kulkami and Florian Zeiger (Siemens

    Malicious traffic analysis in wireless sensor networks using advanced signal processing techniques

    Get PDF
    The recent advances in micro-sensor hardware technologies, along with the invention of energy-efficient protocols, have enabled a world-wide spread in wireless sensor networks deployment. These networks are used for a large number of purposes, while having small maintenance and deployment costs. However, as these are usually unattended networks, several security threats have emerged. In this work, we show how an adversary can overhear the encrypted wireless transmissions, and detect the periodic components of the wireless traffic that can further reveal the application used in the sensor network. Traffic analysis is performed in a very energy-efficient way using the compressed sensing principles. Furthermore, the periodic components are detected using the Lomb-Scargle periodogram technique. © 2013 IEEE

    Denial-of-service attacks in wireless networks using off-the-shelf hardware

    Get PDF
    Wireless network technologies offer ubiquitous broadband access to millions of users at an affordable cost. However, the broadband nature of the wireless medium make these networks vulnerable to a number of attacks. Malicious interference at the physical layer, and extended packet collisions at the medium access layer can cause significant DoS attacks. In this work, we show how off-the-shelf hardware can be used to create devastating DoS attacks in a IEEE 802.11 network. Moreover, we present two algorithms for attack detection that are based on the cumulative sum algorithm. © 2014 Springer International Publishing Switzerland

    A family of key agreement mechanisms for mission critical communications for secure mobile ad hoc and wireless mesh internetworking

    Get PDF
    Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for emergency cases where the communication infrastructure has been completely destroyed and there is a need for quick set up of communications among the rescue/emergency workers. In such emergency scenarios wireless mesh networks may be employed in a later phase for providing advanced communications and services acting as a backbone network in the affected area. Internetworking of both types of future networks will provide a broad range of mission critical applications. While offering many advantages, such as flexibility, easy of deployment and low cost, MANETs and mesh networks face important security and resilience threats, especially for such demanding applications. We introduce a family of key agreement methods based on weak to strong authentication associated with several multiparty contributory key establishment methods. We examine the attributes of each key establishment method and how each method can be better applied in different scenarios. The proposed protocols support seamlessly both types of networks and consider system and application requirements such as efficient and secure internetworking, dynamicity of network topologies and support of thin clients. © 2011 Ioannis G. Askoxylakis et al

    Communications in emergency and crisis situations

    Get PDF
    In emergency and crisis situations (ECS) like earthquakes, tsunamis, terrorist attacks, it is very important that communication facilities are operative to provide services both to rescue teams and civilians. In ECS it is very common that communication premises are often unable to provide services, either due to physical damages or traffic overload. In such a case there is the need for rapid reestablishment of communication services. In this paper the communication services that can be exploited for ECS mitigation are discussed. The usage scenarios of such services are studied. Following that and looking from a network perspective view an ECS communication network architecture is presented. This architecture aims to provide seamless interoperability of varies communication technologies often present in ECS to provide an ECS communication solution. © 2014 Springer International Publishing Switzerland

    The impact of interference on the performance of a multi-path metropolitan wireless mesh network

    Get PDF
    Wireless mesh networks (WMNs) have attracted much attention lately for providing efficiently wireless services with high quality of service (QoS). Metropolitan WMNs are a low-cost solution for providing broadband wireless internet access in large areas. One of the fundamental issues of wireless communications is interference. In WMNs interference can be caused by simultaneous transmissions at links internal to the mesh network or by external sources. In this work we perform extensive measurements in a multi-radio metropolitan WMN deployed in the city of Heraklion, Greece. The basic goal is to investigate the impact of interference on the performance of the multi-path WMN. Towards that goal, we perform measurements with FTP, video streaming and raw data traffic for two scenarios, one with an efficient channel assignment (CA) that accounts for interference and another with a random CA that results in high internal and external interference in the network. The results prove that interference creates severe performance degradation, with regards to high delay, high packet losses, low throughput and low signal-to-interference and noise ratio (SINR). As a result, the metropolitan WMN becomes unable to support multi-path flows and demanding applications with an acceptable QoS. © 2011 IEEE
    • …
    corecore