PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

New Threats and Innovative Protection Methods in Wireless Transmission Systems

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Many improvements in the field of wireless communication can be observed nowadays. Some developments are gradual, others are revolutionary. It is obvious that each innovation in the area may lead to new security threats and vulnerabilities. Such technologies and transmission methods as: Near Field Communication (NFC), Visible Light Communication (VLC), handover, mesh networks, 5G cellular network, mobile IPv6, beamforming, cooperative beamforming, Multiple Input Multiple Output (MIMO), Orthogonal Frequency Division Multiple Access (OFDMA), transmission in Extra High Frequency (EHF) band are very important from the security point of view. In order to preserve high level of security one needs to identify, analyse and classify distinctive sets of threats and vulnerabilities as well as some emerging data protection opportunities related to innovative wireless transmission methods and technologies. This identification, analysis and classification is a main purpose of the paper. It will focus on cryptography in wireless systems, security vs. energy tradeoffs, physical layer security. For example, common problems related to cryptography may be solved with a use of physical layer security. Data confidentiality may be fulfilled with a use of beamforming and jamming, authentication may be performed with a use of out-of-band authentication model.
Rocznik
Tom
Strony
26--33
Opis fizyczny
Bibliogr. 27 poz., tab.
Twórcy
autor
  • Institute of Control and Information Engineering, Poznan University of Technology, Poznan, Poland
Bibliografia
  • [1] J. E. Bicford, “Rootkits on smart phones: Attacks, implications and energy-aware defense techniques”, Graduate School – New Brunswick Rutgers, The State University of New Jersey, 2012.
  • [2] T. Bilski, “From IPv4 to IPv6 – Data Security in the Transition Phase”, in Proc. 7th Int. Conf. Netw. Serv. ICNS 2011, Venice/Mestre, Italy, 2011, pp. 66–72.
  • [3] T. Bilski, “Network performance issues in IP transition phase”, in Proc. 6th Int. Conf. Netw. Comput. Adv. Inform. Manag. NCM 2010, Seoul, Korea, 2010, pp. 39–44, 2010.
  • [4] K. Bauer, D. McCoy, B. Greenstein, D. Grunwald, and D. Sicker, “Physical layer attacks on unlinkability in wireless LANs”, in Privacy Enhancing Technologies, I. Goldberg and M. Atallah, Eds. LNCS, vol. 5672. Berlin Heidelberg: Springer, 2009, pp. 108–127.
  • [5] T. Bilski, “Traffic analysis based on IP packet size”, Studia Informatica, vol. 32, no. 3A(98), Silesian University of Technology Press, Gliwice, Poland, pp. 167–176, 2011.
  • [6] S. Joyce, “Traffic on the Internet – Report”, 2000 [Online]. Available: http://wand.cs.waikato.ac.nz/old/wand/publications/sarah-420.pdf
  • [7] J. Postel, “Internet Control Message Protocol”, IETF, RFC 792, 1981.
  • [8] L. Ying-Dar et al., “Application classification using packet size distribution and port association”, J. Netw. and Comp. Appl., vol. 32, no. 5, pp. 1023–1030, 2009.
  • [9] B. Salem and J. P. Hubaux, “Securing wireless mesh networks”, Wirel. Commun., vol. 13, no. 2, pp. 50–55, 2006.
  • [10] A. Egners and U. Meyer, “Wireless mesh network security: State of affairs”, in Proc. 5th IEEE Conf. Local Comp. Netw. LCN 2010, Denver, USA, 2010.
  • [11] M. Liberatore and B. N. Levine, “Inferring the source of encrypted HTTP connections”, in Proc. 13th ACM Conf. Comp. Commun. Secur. CCS 2006, New York, USA, 2006.
  • [12] Physical Layer Security in Wireless Communications. X. Zhou, L. Song, Y. Zhang, Eds. Boca Raton: CRC Press, 2014.
  • [13] X. Wang, M. Tao, J. Mo, and Y. Xu, “Physical-layer security in OFDMA-based broadband wireless networks”, in Proc. IEEE Int. Conf. Commun. ICC 2011, Kioto, Japan, 2011, pp. 1–5.
  • [14] L. Caviglione and A. Merlo, “The energy impact of security mechanisms in modern mobile devices”, Netw. Secur., Feb. 2012 [Online]. Available: http://www.ai-lab.it/merlo/publications/NS-2012.pdf
  • [15] F. C. Colon Osorio, E. Agu, and K. McKay, “Tradeoffs between energy and security in wireless networks”, Worcester Polytechnic Institute, 2005 [Online]. Available: http://digitalcommons.wpi.edu/computerscience-pubs/67
  • [16] G. Portokalidisi, P. Homburg, K. Anagnostakis, and H. Bos, “Paranoid Android: Versatile protection for smartphones”, in Proc. 26th Ann. Comp. Secur. Appl. Conf., Austin, TX, USA, 2010, pp. 347–356.
  • [17] C. Chung-Kuo and H. Chin-Tser, “Fast and secure mobility for IEEE 802.16e broadband wireless networks”, in Proc. Int. Conf. Parallel Process.Workshops ICPPW 2007, Xi-An, China, 2007.
  • [18] Q. Wu, T. Taylor, Y. Nir, K. Hoeper, and S. Decugis, “Handover Keying (HOKEY) Architecture Design”, IETF, RFC 6697, 2012.
  • [19] Y. Ohba, S. Das, and D. Ashutosh, “Kerberized handover keying: A media-independent handover key management architecture”, in Proc. 2nd ACM Int. Worksh. Mobil. Evolv. Internet Archit. MobiArch 2007, Kyoto, Japan, 2007.
  • [20] I. Csiszar and J. Korner, “Broadcast channels with confidential messages”, IEEE Trans. Inform. Theory, vol. 24, no. 3, pp. 339–348, 1978.
  • [21] N. Yang, P. Lep Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, “Transmit antenna selection for security enhancement in MIMO wiretap channels”, IEEE Trans. Commun., vol. 61, no. 1, pp. 144–154, 2013.
  • [22] J. Mo, M. Tao, Y. Liu, B. Xia, and X. Ma, “Secure Beamforming for MIMO Two-Way Transmission with an Untrusted Relay”, in Proc. IEEE Wirel. Commun. Netw. Conf. WCNC 2013, Shanghai, China, 2013, pp. 3279–3284.
  • [23] A. Mukherjee and A. L. Swindlehurst, “Robust beamforming for security in MIMO wiretap channels with imperfect CSI”, IEEE Trans. Sig. Proces., vol. 59, no. 1, pp. 351–361, 2011.
  • [24] N. Romero-Zurita, M. Ghogho, and D. McLernon, “Physical layer security of MIMO frequency selective channels by beamforming and noise generation”, in Proc. 19th Eur. Sig. Proces. Conf. EUSIPCO 2011, Barcelona, Spain, 2011, pp. 829–833.
  • [25] H. Ochiai, P. Mitran, H. V. Poor, and V. Tarokh, “Collaborative beamforming for distributed wireless ad hoc sensor networks”, IEEE Trans. Sig. Proces., vol. 53, no. 11, pp. 4110–4124, 2005.
  • [26] H. Wang, M. Luo, X. Xia, and Q. Yin, “Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper’s CSI”, IEEE Sig. Proces. Lett., vol. 20, no. 1, pp. 39–42, 2013.
  • [27] R. Mayrhofer and M. Welch, “A human-verifiable authentication protocol using visible laser light”, in Proc. 2nd Int. Conf. Availab., Reliab. Secur. ARES 2007, Vienna, Austria, 2007.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-877c58f1-e716-4b8d-911b-d8feeef0b504
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.