83 research outputs found
Covert Channels in SIP for VoIP signalling
In this paper, we evaluate available steganographic techniques for SIP
(Session Initiation Protocol) that can be used for creating covert channels
during signaling phase of VoIP (Voice over IP) call. Apart from characterizing
existing steganographic methods we provide new insights by introducing new
techniques. We also estimate amount of data that can be transferred in
signalling messages for typical IP telephony call.Comment: 8 pages, 4 figure
Emerging and unconventional: New Attacks and innovative detection techniques
Nowadays, security must face new and challenging scenarios, for instance, those exploiting cloud and fog computing, the Internet of Things (IoT), or complex frameworks for orchestrating botnets. Therefore, new attacks and innovative countermeasures should be investigated and this special issue focuses on how advancements provided by information and communication technologies influence modern cyberinfrastructures..
Information security methodology, replication studies and information security education
International audienc
On improving 5G internet of radio light security based on led fingerprint identification method
Copyright: © 2021 by the authors. In this paper, a novel device identification method is proposed to improve the security of Visible Light Communication (VLC) in 5G networks. This method extracts the fingerprints of Light-Emitting Diodes (LEDs) to identify the devices accessing the 5G network. The extraction and identification mechanisms have been investigated from the theoretical perspective as well as verified experimentally. Moreover, a demonstration in a practical indoor VLC-based 5G network has been carried out to evaluate the feasibility and accuracy of this approach. The fingerprints of four identical white LEDs were extracted successfully from the received 5G NR (New Radio) signals. To perform identification, four types of machine-learning-based classifiers were employed and the resulting accuracy was up to 97.1%.EU Horizon 2020 program towards the Internet of Radio-Light project H2020-ICT 761992
Recommended from our members
A Scaleable and License Free 5G Internet of Radio Light Architecture for Services in Train Stations
In this paper we present a 5G Internet Radio-
Light (IoRL) architecture for underground train stations that
can be readily deployed because it utilizes unlicensed visible light
and millimeter wave part of the spectrum, which does not require
Mobile Network Operator (MNO) permission to deploy and
which is used to provide travelers with accurate location,
interaction, access to Internet and Cloud based Services, such as
high resolution video on a Tablet PC. The paper describes the
train station use cases and the IoRL architecture.European Commissio
- âŠ