The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Physical layer security is becoming a promising technology to face the security challenges of diversified and rapidly-growing wireless applications. In this paper, we propose a three-hop secure Orthogonal Frequency Division Multiplexing (OFDM) transmission protocol for the wireless networks with untrusted relays. In the proposed protocol, instead of exploiting the degree of freedom over spatial domain...
Future automated vehicles will rely on V2V communication to exchange information about their motion states and take corresponding control actions, to enhance road safety and efficiency. Evaluating the trustworthiness of such data in a VANET is critical as malicious vehicles may inject false data which will undermine the benefits of V2V communication and lead to severe consequences, such as collisions...
The rapid growth of WLAN over past few years has increased immensely in academia as well as in every industry, but many weaknesses are there in ad hoc network, due to this many attackers are really passionate towards authorization. For the authentication defense mechanism and wireless monitoring has become a vital component of computer security to predict and prevent attacks. In this paper, we explain...
Technological advances in wearable and implanted medical devices are enabling wireless body area networks to alter the current landscape of medical and healthcare applications. These systems have the potential to significantly improve real time patient monitoring, provide accurate diagnosis and deliver faster treatment. In spite of their growth, securing the sensitive medical and patient data relayed...
The use of wireless technologies within factories demands a comprehensive understanding of the problems and potential solutions associated with the rigors of the manufacturing environment. A clearly defined problem space would significantly ease the selection and deployment of appropriate wireless solutions to connected factory systems. A mapping of potential technologies to classes of use cases within...
As the widespread deployment and usage of 802.11-based wireless local area networks (WLANs), Wi-Fi users are vulnerable to be attacked by a security threat called evil twins. The evil twin, a kind of rogue access points (RAPs), masquerades as a legitimate access point (AP) to lure users to connect it. Malicious adversaries can easily configure evil twins on a laptop to induce victim wireless users...
Wireless sensor network is a collection of several nodes in a network capable of sharing information in wireless medium. Due to the presence of wireless medium it is highly vulnerable to network attacks. WSN has many applications ranging from monitoring of environment to highly restricted military and surveillance where security is a major requirement. The most common and dangerous attack which can...
We present recent work in the design and operation of wireless sensor-actuation systems along three aspects. At the device level, a major drive is the reduced power consumption of the wireless transceivers without loss of control performance. At the channel access level, a shared wireless channel needs to be administered between multiple systems with control performance guarantees for all systems...
We consider a wireless sensor network secured by a heterogeneous random key predistribution scheme and investigate its reliability against both link and node failures. The heterogeneous random key predistribution scheme is a lightweight security mechanism proposed to secure sensor networks that include nodes with varying levels of resources, features, or connectivity requirements; e.g., regular nodes...
Modern wireless technology opens the door for several new Intelligent Transportation applications. In an academic environment, students use transit bus system on a daily base. El-Tawab et al. [1] introduced a cyber-physical system to monitor the quality of service for transit buses around an academic campus. This cyber-physical system detects the number of riders waiting for the bus system at each...
Traditional model of computing with wireless sensors imposes restrictions on how efficiently wireless sensors can be used due to resource constraints. Newer models for interacting with wireless sensors such as Internet of Things and Sensor Cloud aim to overcome these restrictions. In this tutorial, I will discuss sensor cloud architectures, which enable different wireless sensor networks, spread in...
Secret key establishment is a fundamental requirement for private communication between two wireless entities. An intriguing solution is to extract secret keys from the inherent randomness shared between them. Although several works have been done to extract secret keys from different kinds of mediums (e.g., RSSI, CSI, CIR), the efficiency and security problems are not fully solved. In this paper,...
Protecting the security of the cyber-physical systems that make up the world's critical infrastructures has been a recent hotly debated topic. Legacy wireless communication infrastructure is often an impediment to quickly improving these crucial systems, as cryptographic solutions prove impossible to deploy. In this article, we propose the establishment of a separate verification layer for sensitive...
Data aggregation is a significant issue for marine wireless sensor networks. However, marine sensors are always deployed far away from the security monitoring. Thus, the secure data aggregation for marine sensor networks emerges and attracts the researchers and engineers. Multi-signature enables the data aggregation with a single signature to authenticate the message under different signers. However,...
It is well-known that wireless channel reciprocity together with fading can be exploited to generate a common secret key between two legitimate communication partners. This can be achieved by exchanging known deterministic pilot signals between both partners from which the random fading gains can be estimated and processed. However, the entropy and thus quality of the generated key depends on the...
In this paper, it is aimed to develop a wireless home automation and security system having an easy installation, as well as a robust and flexible realization. A low cost microcomputer is used as a server and necessary software programs are optimized and realized to interact with peripheral devices, which are specially designed for the proposed system. Proof of concept version is obtained after establishing...
The Paper describes certain Novel Technologies and Security concepts that have been successfully developed in Saudi Arabia through Privately funded Research & Development. These include various Wireless Video based Security & Surveillance and Robotic Systems and other Integrated Security Concepts that are very relevant in the current environment. The paper discusses and highlights several...
In many applications of wireless sensor networks (WSNs), sensors are deployed in hostile environments where an adversary can eavesdrop communications. To secure communications in WSNs, the q-composite key predistribution scheme has been widely recognized as a suitable approach. In this paper, we investigate connectivity in secure WSNs operating under the q-composite scheme, in consideration of different...
For wireless networking standards which aim for remote control and sensor application in radio environments and isolated locations can be achieved by ZigBee. The shorter range of connectivity can be achieved by Bluetooth and it is wireless. In this article we motivate the need to learn and understand about various new technologies like ZigBee and Bluetooth. Further, we get detailed knowledge about...
This work introduces a novel security framework for wireless sensor networks (WSN) based on dynamic duty cycle, which allows nodes to detect their compromised neighbors based on unanticipated fluctuations in network traffic send rate over time. Our framework was assessed by its ability to detect advanced WSN threats (e.g., active, passive, or both attacks). One of the benefits of this framework is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.