55 research outputs found

    A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems

    Get PDF
    Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems; its implications are immense. This paper presents a critical analysis of the current approaches to mobility management by evaluating them against a set of criteria which are essentially inherent characteristics of such systems on which these approaches are expected to provide acceptable performance. We summarize these characteristics by using a quadruple set of metrics. Additionally, using this set we classify the various approaches to mobility management that are discussed in this paper. Finally, the paper concludes by reviewing the main findings and providing suggestions that will be helpful to guide future research efforts in the area

    Asynchronous transfer mode security

    No full text
    There is a growing interest in the development of broadband services and networks for commercial use in both local area and wide area networks. The primary reasons for this is a pressing need to meet the demand for increased bandwidth for remote sites interconnection, and in high speed data transfer of bulk data such as images etc. There has also been a significant change in the characteristics of network traffic. It is increasingly taking the form of bursty traffic characterized by an unpredictable demand for bandwidth of several megabytes. A new generation of networking technologies have emerged to meet the demand of growing and uncertain bandwidth requirements. One such technology is called Asynchronous Transfer Mode (ATM) for use on broadband networks under the banner of broadband ISDN. ATM enables interconnection at high speeds in the range of Mbit/s or Gbit/s over wide areas, which effectively moves the bottleneck from networks to end systems. Furthermore, the user is able to access bandwidth on demand and the user is only charged for the bandwidth actually used. As more and more information (audio, image and data) is transferred over ATM networks, security issues are becoming increasingly critical. The rapidly growing use of the Internet to transfer confidential and sensitive information only enhances the importance of security services. One may even argue that the success of ATM will be determined not by its cost effectiveness but also to the level of trust that can be placed on its performance, security and availability. The objective of this dissertation is to address the issues involved in the design of security services for ATM networks

    Security issues in mobile IP and mobile ad hoc networks

    No full text
    The need for information anywhere and at any time has been the driving force for the increasing growth in mobile networks and devices. The field of mobile computing is the merger of advances in computing and communications with the aim of providing seamless and ubiquitous computing environment for mobile users. Whereas notebook computers and personal digital assistants (PDAs) are self-contained, networked computing constitutes a new paradigm of computing that is revolutionizing the way computers are used. Mobile networking greatly enhances the utility of carrying a computing device. It provides mobile users with versatile communication to other people and expedient notification of important events, yet with much more flexibility than cellular telephones and pagers. It also permits continuous access to services and resources of the traditional land-based wired networks. This combination of networking and mobility will engender new applications and services, such as collaborative software to support impromptu meetings, electronic bulletin boards that adapt to the contents according to the participants present, self adjusting lighting and heating, and navigation software to guide users in unfamiliar places and tours. To support mobility in the Internet, the Internet Protocol (IP) has been extended to support mobility. Also at the same time, there is also a growing trend for these IP based networks to operate in an infrastructureless environment called mobile ad-hoc networks. However, the proliferation of such mobile networks depends on a multitude of factors, with trustworthiness being one of the primary challenges to be met. The objective of this dissertation is to address the issues involved in the design of security services for Mobile IP and ad-hoc networks. Extensions to IP based networks (both wired and infrastructureless networks) to facilitate mobility have not been designed keeping security in mind. However adequate security features are basic requirements for the continued functioning of mobile networks. Clearly the problem is so broad that there is no way to devise a general solution We aim to address most of these wide- ranging problems and in the process initiate a practical approach to the development of an integrated security infrastructure for mobile networks. The intention is to seamlessly integrate these security services and mechanisms at the IP level within the mobile IP and ad-hoc networks. The provision of security services at the higher and lower layers and their interoperability with our proposed framework is outside the scope of this thesi

    Securing the ad hoc dynamic source routing protocol

    No full text
    Ad-hoc routing protocols are challenging to design and the need for security services further complicates the situation. So far the proposals for routing in ad-hoc networks offer no security mechanisms at all, or have only partial solutions for protecting the routing. In this paper, we present a scheme for providing security services for routing of control messages in an ad-hoc network. Our focus is on on-demand routing protocols for ad-hoc networks, specifically the dynamic source routing protocol.4 page(s

    A Non-key based security scheme supporting emergency treatment of wireless implants

    No full text
    The security of wireless communication module for Implantable Medical Devices (IMDs) poses a unique challenge that doctors in any qualified hospital should have the access to the IMDs for an emergency treatment while the IMD should be protected from adversaries during a patient's daily life. In this paper, we present a non-key based security scheme for the emergency treatment of IMDs, named the BodyDouble. This scheme employs an external authentication proxy embedded in a gateway to authenticate the identity of a programmer. The gateway here employs a transmitting antenna to send data and jamming signals. When an adversary launches attacks, the gateway jams the request signal to the IMD and authenticates its identity. The gateway will also pretend to be the wireless module of the IMD by establishing a communication link with the adversary so that the adversary is spoofed to communicate with the gateway instead of the IMD. For the emergency situation, the IMD can be accessed without using any cryptographic keys by simply powering off or removing the gateway. Simulation results show that this security scheme can protect the IMD from the adversary's attacks successfully, and resist the potential repeated attacks to prevent the battery depletion of the IMD.6 page(s

    Encryption for implantable medical devices using modified one-time pads

    No full text
    We present an electroc1ardiogram (ECG)-based data encryption (EDE) scheme for implantable medical devices (IMDs). IMDs, including pacemakers and cardiac defibrillators, perform therapeutic or even life-saving functions and store sensitive data; therefore, it is important to prevent adversaries from having access to them. The EDE is designed with the ability to provide information-theoretically unbreakable encryption where two well-known techniques of classic one-time pads (OTPs) and error correcting codes are combined to achieve a cryptographic primitive for IMDs. Unlike other ECG-based key agreement schemes where ECG features are used to facilitate a key distribution, in the EDE scheme, random binary strings generated from ECG signals are directly used as keys for encryption. OTP keys are generated by the IMD and the programmer, respectively, before each encryption attempt; thus, the EDE does not require a cryptographic infrastructure to support a key distribution, storage, revocation, and refreshment. Protected by the EDE, IMDs could not be accessed by adversaries; however, medical personnel can have access to them by measuring real-time ECG data in emergencies. Therefore, the EDE design achieves a balance of high security and high accessibility for the IMD. Our data and security analysis shows that the EDE is a viable scheme for protecting IMDs.12 page(s

    Wireless Body Area Sensor Networks: Survey of MAC and Routing Protocols for Patient Monitoring under IEEE 802.15.4 and IEEE 802.15.6

    No full text
    Wireless body area sensor networks (WBASNs) have received growing attention from industry and academia due to their exceptional potential for patient monitoring systems that are equipped with low-power wearable and implantable biomedical sensors under communications standards such as IEEE 802.15.4-2015 and IEEE 802.15.6-2012. The goal of WBASNs is to enhance the capabilities of wireless patient monitoring systems in terms of data accuracy, reliability, routing, channel access, and the data communication of sensors within, on and around the human body. The huge scope of challenges related to WBASNs has led to various research publications and industrial experiments. In this paper, a survey is conducted for the recent state-of-art in the context of medium access control (MAC) and routing protocols by considering the application requirements of patient monitoring systems. Moreover, we discuss the open issues, lessons learned, and challenges for these layers to provide a source of motivation for the upcoming design and development in the domain of WBASNs. This survey will be highly useful for the 6th generation (6G) networks; it is expected that 6G will provide efficient and ubiquitous connectivity to a huge number of IoT devices, and most of them will be sensor-based. This survey will further clarify the QoS requirement part of the 6G networks in terms of sensor-based IoT

    An Improved Binary Sequence generation for securing wireless body area networks

    No full text
    Random Binary Sequences (BSS) play an important role in cryptographic algorithms. In order to secure Wireless Body Area Networks (WBANs), electrocardiogram (ECG) signal-based BS generation algorithms were studied in previous papers. These algorithms process Inter-pulse Intervals (IPIs) from the ECG signal, which normally needs about 20 to 30 seconds to generate a 128-bit BS. In order to improve the time efficiency of BS generation, we propose an improved algorithm which utilizes multiple types ECG features, including RR, RQ, RS, RP and RT intervals. This algorithm is faster than the IPI-based algorithms since it uses five types of ECG feature values in the BS generation.2 page(s
    • …
    corecore