2,616 research outputs found
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
An Analytical Model of Packet Collisions in IEEE 802.15.4 Wireless Networks
Numerous studies showed that concurrent transmissions can boost wireless
network performance despite collisions. While these works provide empirical
evidence that concurrent transmissions may be received reliably, existing
signal capture models only partially explain the root causes of this
phenomenon. We present a comprehensive mathematical model that reveals the
reasons and provides insights on the key parameters affecting the performance
of MSK-modulated transmissions. A major contribution is a closed-form
derivation of the receiver bit decision variable for arbitrary numbers of
colliding signals and constellations of power ratios, timing offsets, and
carrier phase offsets. We systematically explore the root causes for successful
packet delivery under concurrent transmissions across the whole parameter space
of the model. We confirm the capture threshold behavior observed in previous
studies but also reveal new insights relevant for the design of optimal
protocols: We identify capture zones depending not only on the signal power
ratio but also on time and phase offsets.Comment: Accepted for publication in the IEEE Transactions on Wireless
Communications under the title "On the Reception of Concurrent Transmissions
in Wireless Sensor Networks.
A Lesson in Scaling 6LoWPAN -- Minimal Fragment Forwarding in Lossy Networks
This paper evaluates two forwarding strategies for fragmented datagrams in
the IoT: hop-wise reassembly and a minimal approach to directly forward
fragments. Minimal fragment forwarding is challenged by the lack of forwarding
information at subsequent fragments in 6LoWPAN and thus requires additional
data at nodes. We compared the two approaches in extensive experiments
evaluating reliability, end-to-end latency, and memory consumption. In contrast
to previous work and due to our alternate setup, we obtained different results
and conclusions. Our findings indicate that direct fragment forwarding should
be deployed only with care, since higher packet transmission rates on the
link-layer can significantly reduce its reliability, which in turn can even
further reduce end-to-end latency because of highly increased link-layer
retransmissions.Comment: If you cite this paper, please use the LCN reference: M. S. Lenders,
T. C. Schmidt, M. W\"ahlisch. "A Lesson in Scaling 6LoWPAN - Minimal Fragment
Forwarding in Lossy Networks." in Proc. of IEEE LCN, 201
Old Wine in New Skins? Revisiting the Software Architecture for IP Network Stacks on Constrained IoT Devices
In this paper, we argue that existing concepts for the design and
implementation of network stacks for constrained devices do not comply with the
requirements of current and upcoming Internet of Things (IoT) use cases. The
IoT requires not only a lightweight but also a modular network stack, based on
standards. We discuss functional and non-functional requirements for the
software architecture of the network stack on constrained IoT devices. Then,
revisiting concepts from the early Internet as well as current implementations,
we propose a future-proof alternative to existing IoT network stack
architectures, and provide an initial evaluation of this proposal based on its
implementation running on top of state-of-the-art IoT operating system and
hardware.Comment: 6 pages, 2 figures and table
- …