The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studies the physical layer security of uplink (UL) transmission in simultaneous wireless information and power transfer (SWIPT) deployed in wireless sensor networks (WSNs). Firstly, we model the random network as Poisson cluster process (PCP) to focus on the case where eavesdroppers hide around certain targets to intercept the confidential information successfully. Then, the communication...
In this work, we show the existence of human radio biometrics and present a human identification system that can discriminate individuals even through the walls in a non-line-of-sight condition. Using commodity WiFi devices, the proposed system captures the channel state information (CSI) and extracts human radio biometric information from WiFi signals using time-reversal (TR) technique. By leveraging...
In this paper, we present a millimeter wave system that combines several innovations to enable practical use of the yet unharnessed capacity of the millimeter spectrum for high speed and secure wireless connectivity. Essential to its realization is a novel ultra-wideband array that incorporates suitable balanced feeds. Also, unique bandwidth reconfiguration technique is presented via simple tuning...
This paper aims to analyze the interference between wireless traffic light controller and remote keyless entry for vehicles. Both systems are located closely to each other at the frequency 433–434 MHz. During the analysis, broadcast variant time delay on wireless traffic light versus distances between and RKE determined to ensure their interference. The interference impact is evaluated in a scenario...
In this paper we present the developed components and the electronic packaging design for a miniaturized, wireless neural electrode. Particularly, the whole system consists of a hook-up electrode for contacting the nerve and an electronic part that generates and sends stimulating signals to the nerve and records the neural signals. The hook-up electrode has been designed in a way that enhances the...
By using covert channels, a malicious entity can hide messages within regular traffic and can thereby circumvent security mechanisms. This same method of obfuscation can be used by legitimate users to transmit messages over hostile networks. A promising area for covert channels is wireless networks employing carrier sense multiple access with collision avoidance (CSMA/CA) (e.g., 802.11 networks)....
A fundamental assumption of link signature based security mechanisms is that the wireless signals received at two locations separated by more than half a wavelength are essentially uncorrelated. However, it has been observed that in certain circumstances (e.g., with poor scattering and/or a strong line-of-sight (LOS) component), this assumption is invalid. In this paper, a Correlation ATtack (CAT)...
Tourists traveling abroad, always forget the assembling time or the events of on the wrong tour bus, resulting in delay follow-up trip. Therefore, in order to solve the above problem, this paper uses RFID, infrared sensors, LabVIEW and RF radio frequency technology to develop a tour management system. This system can replace the guides automatically roll call and can display the number of tourists...
Jamming attacks have been recently studied as wireless security threats disrupting reliable RF communication in a wireless network. By emitting noise-like signals arbitrarily on the shared wireless medium, a jammer can easily disturb the network. Countermeasures such as Frequency-Hopping Spread Spectrum enable nodes to avoid the jamming attacks by hopping over multiple channels. However, these solutions...
Modern industrial automation control systems are growing to be large-scaled, complex and information-luxuriant, so that selecting and displaying proper information to operators is becoming more and more difficult. Asset management in such large control systems is also a tough challenge. Location-based Services (LBS) is thought to be an effective approach to filter information to operators, and enhance...
Certain popular wireless sensor network applications, including disaster recovery, battlefield communication and athlete monitoring, are characterized by extensive node mobility, intermittent contact between nodes and a highly dynamic network topology. Traditional routing protocols and security schemes are designed for essentially static networks and do not perform well in this case. This has given...
A short-distance wireless transmission program of laser echo signal was proposed to solve the problems: atrocious conditions, wiring in need of special protection, the cost of higher. The digital echo signal was transmitted into embedded single-chip LPC2880, through the wireless transmission module PTR4000, the signal was transmitted to the receiving system. Receiving system will receive the signal...
We investigate the feasibility of achieving perfect secrecy in wireless network communications without shared secrets. We introduce a secure coding problem in which not only the sender but also the receiver participates in the coding. In essence, the receiver's role is to selectively jam the sender's transmission at the level of bits, bytes, or packets. We then design a class of secure codes, which...
In this paper, we discuss wireless reduction of quality (RoQ) attacks against the transmission control protocol (TCP). RoQ attacks can dramatically degrade the TCP performance with a less number of wireless jamming attacking packets, which makes them rather difficult to detect. We propose a RoQ attack model which exposes the possibility to launch a RoQ attack and illustrates attack conditions. A CTS...
Transporting live Image/video data thought a Wireless Network is required in many applications (such as video wireless sensor networks). However multi-hop wireless video transportation is inherently more vulnerable against attackers due to the openness of its physical media. We present a blind video watermark scheme that is resilient against correlation attack and playback attack. Our scheme uses...
The most promising application of field programmable gate arrays (FPGA) is reconfigurable computing, which gives basis for prototyping a swarm intelligence and the behavior of smart objects. With different configurations, the functionality of an FPGA can change different modular units of smart objects. With a swarm of these FPGA-based objects, it is possible to take advantage of a new kind of data...
In recent years Ultra Wide Band (UWB) noise technology has received attractive attention for the best electromagnetic compatibility (EMC) and low probability of interception (LPI) performances. UWB signals are used at short distance wireless communications in the 3.1-10.6 GHz frequency region and transmission of sensor data [1-3]. UWB noise continuous wave-forms provide secure wireless communications...
In wireless sensor networks, the majority of key managements use the random key predistribution mechanism which is based on the probability model. Thus, an adversary can easily get the keys between any two non-compromised nodes by compromising some number of nodes. If an adversary gets the keys, he can modify or insert messages into the communication channels. These kinds of attacks are very critical...
Due to the broadcast nature of the wireless medium, wireless communication is susceptible to adversarial eavesdropping. This paper describes how eavesdropping can potentially be defeated by exploiting the superposition nature of the wireless medium. A Gaussian wire-tap channel with a helping interferer (WTC-HI) is considered in which a transmitter sends confidential messages to its intended receiver...
A scheme that exploits the broadcast nature of the wireless communication in order to achieve multicast content delivery is presented in this paper. As opposed to broadcasting, this method enables the clients to determine on-line the delivered content, and thus preserves the advantages of an individual service. On the other hand, a multicast content delivery is much more efficient than a unicast content...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.