The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Physical layer security is becoming a promising technology to face the security challenges of diversified and rapidly-growing wireless applications. In this paper, we propose a three-hop secure Orthogonal Frequency Division Multiplexing (OFDM) transmission protocol for the wireless networks with untrusted relays. In the proposed protocol, instead of exploiting the degree of freedom over spatial domain...
Future automated vehicles will rely on V2V communication to exchange information about their motion states and take corresponding control actions, to enhance road safety and efficiency. Evaluating the trustworthiness of such data in a VANET is critical as malicious vehicles may inject false data which will undermine the benefits of V2V communication and lead to severe consequences, such as collisions...
This paper studies the physical layer security of uplink (UL) transmission in simultaneous wireless information and power transfer (SWIPT) deployed in wireless sensor networks (WSNs). Firstly, we model the random network as Poisson cluster process (PCP) to focus on the case where eavesdroppers hide around certain targets to intercept the confidential information successfully. Then, the communication...
Wireless Mesh Network (WMN) is an upcoming technology that supplements wired infrastructure with wireless backbone to provide Internet connectivity to mobile nodes (MN) or users in residential areas and offices. Here the each wireless backbone node operates both as a wireless router that forwards packets of other nodes & as a wireless bridge transmitting the packets of its clients WMN has the...
The rapid growth of WLAN over past few years has increased immensely in academia as well as in every industry, but many weaknesses are there in ad hoc network, due to this many attackers are really passionate towards authorization. For the authentication defense mechanism and wireless monitoring has become a vital component of computer security to predict and prevent attacks. In this paper, we explain...
Recently, the security issues of CPS have attracted much attention from many researchers. Standing on the point of attacker, this work investigates the optimal channel jamming attack against wireless state estimation in CPS with energy constraint. Specifically, we consider that the attacker can jam the wireless channel with various power levels that will cause different sensory packet drop probabilities...
The technical development towards the full vision of the Internet of Things (IoT) will affect the area of Electromagnetic Compatibility (EMC) in a number of ways. IoT may even be the most challenging issue for the EMC area since it was born about 100 years ago. In this paper, some of these new challenges are highlighted and discussed. The methodology in achieving EMC has to be further developed in...
Technological advances in wearable and implanted medical devices are enabling wireless body area networks to alter the current landscape of medical and healthcare applications. These systems have the potential to significantly improve real time patient monitoring, provide accurate diagnosis and deliver faster treatment. In spite of their growth, securing the sensitive medical and patient data relayed...
The use of wireless technologies within factories demands a comprehensive understanding of the problems and potential solutions associated with the rigors of the manufacturing environment. A clearly defined problem space would significantly ease the selection and deployment of appropriate wireless solutions to connected factory systems. A mapping of potential technologies to classes of use cases within...
As the widespread deployment and usage of 802.11-based wireless local area networks (WLANs), Wi-Fi users are vulnerable to be attacked by a security threat called evil twins. The evil twin, a kind of rogue access points (RAPs), masquerades as a legitimate access point (AP) to lure users to connect it. Malicious adversaries can easily configure evil twins on a laptop to induce victim wireless users...
In this paper, we have discussed the application of Zigbee technology. We have shown that a single remote controlled device can control different devices with different application. The experiment performed by us shows the simulation of zigbee within the range of upto 75 meters. The remote controller uses zigbee to control devices like air-conditioner, lights, automatic curtains, garage-shutters,...
This paper proposes the flexible reassociation control scheme for wireless local area networks (WLANs) based on mechanism design theory. The notion of general preference in the theory enables us to formulate users' various kinds of preference (based on such as high throughput and/or low latency). The proposed scheme is guaranteed to provide a unique allocation of access points (APs) to STAs in each...
Device-free localization (DFL) is an emerging wireless network target localization technique that does not need to attach any electronic device with the target. It is remaining as a challenging research problem due to the weak wireless signals and the uncertain wireless communication environment. In this paper, a novel Gaussian Process (GP) based wireless propagation model is proposed to describe...
Wireless sensor network is a collection of several nodes in a network capable of sharing information in wireless medium. Due to the presence of wireless medium it is highly vulnerable to network attacks. WSN has many applications ranging from monitoring of environment to highly restricted military and surveillance where security is a major requirement. The most common and dangerous attack which can...
Massive advancements in computing and communication technologies have enabled the ubiquitous presence of interconnected computing devices in all aspects of modern life, forming what is typically referred to as the “Internet of Things”. These major changes could not leave the industrial environment unaffected, with “smart” industrial deployments gradually becoming a reality; a trend that is often referred...
The simple structure of compressed sensing (CS) lead to low complexity encryption, which is fascinating for nodes with limited resources in the wireless network. In this paper, we analyze the performance of the encryption method based on compressed sensing, and prove that the encryption can achieve the information theory security. The effect of the sparsity and the signal noise ratio (SNR) on the...
Radio Frequency Identification (RFID) technology is often deployed for inventory management scenarios. In inventory applications, a known or unknown number of RFID tags are queried in a discrete manner and for a single, short period of time, until each tag is recognized by the interrogator device. Passive RFID provides several benefits conducive to ubiquitous deployment, including RFID tags that are...
We present recent work in the design and operation of wireless sensor-actuation systems along three aspects. At the device level, a major drive is the reduced power consumption of the wireless transceivers without loss of control performance. At the channel access level, a shared wireless channel needs to be administered between multiple systems with control performance guarantees for all systems...
This paper investigates an underlay cognitive radio (CR) that extracts energy from radio-frequency signals of one primary user. We assume that both the wireless energy harvesting and the secondary transmission processes of the CR suffer Rayleigh block fading. Considering the intrinsic harvesting- transmitting tradeoff, we optimize the harvesting time and transmit power of the CR to minimize the outage...
We consider a wireless sensor network secured by a heterogeneous random key predistribution scheme and investigate its reliability against both link and node failures. The heterogeneous random key predistribution scheme is a lightweight security mechanism proposed to secure sensor networks that include nodes with varying levels of resources, features, or connectivity requirements; e.g., regular nodes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.