4 research outputs found

    Challenges in the Implementation and Simulation for Wireless Side-Channel based on Intentionally Corrupted FCS

    Get PDF
    AbstractWe report on the challenges faced in the implementation and simulation of a side-channel communication based on frames with an intentionally corrupted Frame Check Sequence (FCS). Systematically corrupted FCSs can be used to enable covert communications between nodes that share the same algorithm for deciphering the FCS. In order to assess the possibility in detecting this side-channel communication it is necessary to have the ability to simulate it as well as to implement it on actual devices. Nearly all simulators drop corrupted frames before they reach their destination, making it impossible to simulate any side-channel communication based on intentionally corrupted FCS. We present an example of the modifications required to prevent this as applied to a well-known simulator called Sinalgo. We also discuss problems encountered when trying to intentionally corrupt the FCS on actual devices

    Apparatus and method for supporting differentiated packet data services within a wireless network

    Get PDF
    A system and method manages Radio Access Network (RAN) resources to service packet data transmissions at Service Quality Levels (SQL) commensurate with packet data network SQLs. A Packet Data Serving Node (PDSN) receives a data packet from a coupled packet data network. The data packet is directed toward a Mobile Station (MS) serviced by the RAN and includes a packet SQL indicator that indicates the level of service provided by the data packet network. A corresponding set of RAN resources is allocated to meet the packet SQL indicator. If the set of RAN resources cannot be allocated, the data packet SQL indicator is remarked accordingly. In another operation, the BSC receives a data packet from a MS serviced by the RAN. The data packet is intended for a coupled packet data network and includes a packet SQL indicator. The BSC first determines a set of allocated RAN resources that are servicing the transmission of the data packet to the packet data network. The BSC then maps the allocated set of RAN resources to a RAN service quality level indicator. If the data packet SQL indicator is incorrectly marked, it is remarked by the PDSN. These operation provide support for both specific SQL operations and differential SQL operations

    Mazda Salmanian

    No full text
    © Sa majesté la reine, représentée par le ministre de la Défense nationale, 2007 This document illustrates the challenges of designing non-centralized authentication mechanisms and identifies requirements and steps for strong authentication techniques needed in military tactical operations. The study provides a survey of distributed trust models and authentication in peer-to-peer, wireless, and mobile ad hoc networks (MANETs). We evaluate a select number of existing proposals for authentication in MANETs and find that none of them meets the requirements and steps for strong authentication. We then propose two new schemes based on asymmetric cryptography: public key infrastructure (PKI) and identitybased encryption (IBE). Both schemes use off-line key generation and integrate user and device authentication for authenticating and allowing a node to be added to a trusted routing table. It is believed that the Lightweight Integrated Authentication (LIA) scheme, based on off-line identity-based encryption, should be faster and simpler to implement. The validation of this hypothesis requires that the proposals be further analyzed, prototyped, and trialed
    corecore