Chapter 15. Cognitive Radio Network Security
|
|
|
- Anthony Glenn
- 10 years ago
- Views:
Transcription
1 Chapter 15 Cognitive Radio Network Security 1
2 Outline A taxonomy of CR security threats Primary user emulation attacks Byzantine failures in distributed spectrum sensing Security vulnerabilities in IEEE
3 Introduction Successful deployment of CR networks and the realization of their benefits will depend on the placement of essential security mechanisms Emergence of the opportunistic spectrum sharing (OSS) paradigm and cognitive radio technology raises new security implications that have not been studied previously Researchers have only recently started to examine the security issues specific to CR devices and networks 3
4 Some Recent Publications on CR Security R. Chen, J. Park, & J. Reed, Defense against primary user emulation attacks in cognitive radio networks, IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, Jan R. Chen, J. Park, T. Hou, & J. Reed, Toward secure distributed spectrum sensing in cognitive radio networks, IEEE Comm. Magazine, vol. 46, no. 4, S. Xiao, J. Park, and Y. Ye, Tamper Resistance for Software Defined Radio Software, IEEE Computer Software and Applications Conference, July K. Bian and J. Park, Security Vulnerabilities in IEEE , Fourth International Wireless Internet Conference, Nov
5 Some Recent Publications on CR Security T. Clancy, N. Goergen, Security in Cognitive Radio Networks: Threats and Mitigation, Int l Conference on Cognitive Radio Oriented Wireless Networks and Communications, May T.B. Brown and A. Sethi, Potential cognitive radio denial-ofservice vulnerabilities and protection countermeasures: a multi-dimensional analysis and assessment, Journal of Mobile Networks and Applications, vol. 13, no. 5, Oct A. Brawerman et al., Towards a fraud-prevention framework for software defined radio mobile devices, EURASIP Journal on Wireless Comm. and Networking, vol. 2005, no. 3, L.B. Michael et al., A framework for secure download for software-defined radio, IEEE Comm. Magazine, July P. Flanigan et al., Dynamic policy enforcement for software defined radio, 38 th Annual Simulation Symposium,
6 A Taxonomy of CR Security Threats CR network security threats Spectrum access - related security threats Radio software security threats Threats to incumbent coexistence mechanisms Spectral honeypots Sensory manipulation: - Primary user emulation - Geospatial manipulation - Chaff point attack - Spam point bias attack Obstruct synchronization of QPs Threats to selfcoexistence mechanisms Tx false/spurious inter-cell beacons (control messages) Exploit/obstruct inter-cell spectrum sharing processes Security threats to the software download process Injection of false/forged policies Injection of false/forged SW updates Injection of malicious SW (viruses) Software IP theft Software tampering Unauthorized policy changes Tampering w/ CR reasoners (e.g., System Strategy Reasoner & Policy Reasoner) 6
7 The Importance of Distinguishing Primary Users from Secondary Users Spectrum usage scenario for a secondary user Periodically search for spectrum white spaces (i.e., fallow bands) to transmit/receive data When a primary user is detected in its spectrum band Immediately vacate that band and switch to a vacant one vertical spectrum sharing When another secondary user is detected in its spectrum band When there are no better spectrum opportunities, it may choose to share the band with the detected secondary user horizontal spectrum sharing CR MAC protocol guarantees fair resource allocation among secondary users 7
8 Primary User Emulation Attacks Distributed Spectrum Sensing Primary signal transmitter Sensor Sensor Sensor Local spectrum sensing results Sensing data collector Data fusion Final spectrum sensing result Adversaries Signals with the same characteristics as primary signals Primary-User Emulation attack: An attacker emulates the characteristics of a primary signal transmitter 8
9 Existing Technique (1): Using Energy Detection to Conduct Spectrum Sensing Trust model An energy detector measures RF energy or the RSS to determine whether a given channel is idle or not Secondary users can recognize each other s signals and share a common protocol, and therefore are able to identify each other If an unidentified user is detected, it is considered a primary user 9
10 Existing Technique (1): Using Energy Detection to Conduct Spectrum Sensing Problem: If a malicious secondary user transmits a signal that is not recognized by other secondary users, it will be identified as a primary user by the other secondary users Interference to primary users Prevents other secondary users from accessing that band 10
11 Existing Technique (2): Matched Filter and Cyclostationary Feature Detection Trust model Matched filter and cyclostationary feature detectors are able to recognize the distinguishing characteristics of primary user signals Secondary users can identify each other s signals Problem: If a malicious secondary user transmits signals that emulate the characteristics of primary user signals, it will be identified as a primary user by the other secondary users Interference to primary users Prevents other secondary users from accessing that band 11
12 Existing Technique (3): Quiet Period for Spectrum Sensing Trust model Define a quiet period that all secondary users stop transmission. It is dedicated for spectrum sensing. Any user detected in the quiet period (using energy detector, matched filter or cyclostationary feature detector) is a primary user Problem: If a malicious secondary user transmits signals in the quiet period, it will be identified as a primary user by the other secondary users Interference to primary users Prevents other secondary users from accessing that band 12
13 The Disruptive Effects of Primary User Emulation Attacks Available link bandwidth (MHz) Selfish attackers Legitimate users Available link bandwidth (MHz) Number of pairs of selfish attackers Number of malicious attackers Selfish PUE attacks Malicious PUE attacks 13
14 Transmitter Verification for Spectrum Sensing Transmitter verification for spectrum sensing is composed of three processes: Verification of signal characteristics Measurement of received signal energy level Localization of the signal source 14
15 A Flowchart of transmitter verification 15
16 Challenges in PST Localization Primary signal transmitter (PST) localization is more challenging than the standard localization problem due to two reasons No modification should be made to primary users to accommodate the DSA of licensed spectrum. This requirement excludes the possibility of using a localization protocol that involves the interaction between a primary user and the localization device(s). PST localization problem is a non-interactive localization problem When a receiver is localized, one does not need to consider the existence of other receivers. However, the existence of multiple transmitters may add difficulty to transmitter localization 16
17 A solution to PST Localization Magnitude of an RSS value typically decreases as the distance between the signal transmitter and the receiver increases If one is able to collect a sufficient number of RSS measurements from a group of receivers spread throughout a large network, the location with the peak RSS value is likely to be the location of a transmitter. Advantage of this technique is twofold, Obviates modification of primary users and Supports localizing multiple transmitters that transmit signals simultaneously 17
18 Byzantine failures in distributed spectrum sensing Cause of Byzantine failures in distributed spectrum sensing (DSS) Malfunctioning sensing terminals Spectrum sensing data falsification (SSDF) attacks A malicious secondary user intentionally sends falsified local spectrum sensing reports to the data collector in an attempt to cause the data collector to make incorrect spectrum sensing decisions 18
19 SSDF Attacks 19
20 Modeling of DSS as a parallel fusion network We can model the DSS problem as a parallel fusion network 20
21 Data fusion algorithms for DSS Decision fusion Bayesian detection Neyman-Pearson test Weighted sequential probability ratio test (WSPRT) 21
22 The Coexistence Problem in CR Networks Incumbent coexistence Avoid serious interference to incumbent users Ex: spectrum sensing for detecting incumbent signals Ex: dynamic frequency hopping to avoid interfering with detected incumbents Why is self-coexistence important in CR networks? Minimize self interference between neighboring networks Need to satisfy QoS of networks admitted service workloads in a DSA environment Ex: prescribes inter-cell dynamic resource sharing mechanisms for better self-coexistence CR coexistence mechanisms can be exploited by adversaries Threats to incumbent coexistence mechanisms Threats to self-coexistence mechanisms 22
23 Operating Environment of Networks WRAN Base Station Incumbent services: TV broadcast services Part 74 devices (wireless microphones) Wireless microphones TV transmitters WRAN Base Station : WRAN Base Station Wireless microphones Typical ~33km Max. 100km : CPE (Consumer Premise Equipment) 23
24 PHY-Layer Support for Coexistence Two-stage spectrum sensing in quiet periods (QPs) Fast sensing stage: a quick and simple detection technique, e.g., energy detection. Fine sensing stage: measurements from fast sensing determine the need and duration of fine sensing stage. Synchronization of overlapping BSs QPs Channel Detection Time Fast sensing Fine sensing Channel Detection Time Fast sensing Fine sensing BS 1 Channel Detection Time Fast sensing Fine sensing Channel Detection Time Fast sensing Fine sensing BS 2 Channel Detection Time Fast sensing Fine sensing Channel Detection Time Fast sensing Fine sensing BS 3 Cognitive Radio Communications and Networks: Principles Fast sensing and Practice Fine sensing Time Transmission 24
25 Cognitive MAC (CMAC) Layer (1) Two types control messages Management messages: intra-cell management Beacons: inter-cell coordination Inter-cell synchronization Frame offset is contained in beacon payload The receiver BS performs frame sliding to synchronize with the transmitter BS. 25
26 Cognitive MAC (CMAC) Layer (2) Inter-BS dynamic resource sharing Needed when QoS of admitted service workload cannot be satisfied prescribes non-exclusive & exclusive spectrum sharing On-demand spectrum contention (ODSC) protocol Select a target channel to contend Each BS selects a Channel Contention Number (CCN) from [0,W]. BS with a greater CCN wins the pair-wise contention procedure. BS wins the channel if it wins all pair-wise contention procedures with all co-channel BSs. Inter-cell beacons used to carry out ODSC 26
27 Cognitive MAC (CMAC) Layer (3) Protection of Part 74 devices (wireless microphones) Class A solution A separate beacon device deployed Transmit short wireless microphone beacons (WMB) Use WMBs to notify collocated cells about operation of Part 74 devices Class B solution A special type of CPE is deployed Class B CPEs detect Part 74 device operations and notify other systems WRAN Base Station Class B CPE Wireless MIC 27
28 Overview of s Security Sublayer security sublayer provides confidentiality, authentication and integrity services for intra-cell management messages PKM (Privacy Key Management) protocol Encapsulation protocol It fails to protect inter-cell beacons used in coexistence mechanisms CMAC mechanisms protected by s security sublayer 28
29 Potential Security Threats DoS attacks Insertion of forged management messages by rogue terminals Prevented by use of mutual authentication and MACs Replay attacks Management messages: Prevented by use of nonces in challenge/response protocols Data packets: Thwarted using AES-CCM & packet numbers Threats against WMBs Class B CPEs possess pre-programmed keys that enable the use of authentication mechanisms to prevent WMB forgery/modification Spurious transmissions in QPs Interfere w/ various coexistence-related control mechanisms Primary user emulation Adversarial radio transmits signals whose characteristics emulate those of incumbent signals 29
30 Security Vulnerabilities in Inter-Cell Coexistence Mechanisms Inter-cell beacons are not protected by s security sublayer! Beacon Falsification (BF) attack Two types of BF attacks Tx of false/forged inter-cell beacons to disrupt spectrum contention processes Network throughput drop interfere with inter-cell synchronization Undermine the accuracy of spectrum sensing 30
31 Disrupting Inter-cell Spectrum Contention Objective of BF attacks Disrupt self-coexistence mechanisms (spectrum contention processes) Attack method Forge inter-cell beacons with arbitrarily large CCN value (e.g., select CCN from [W / z, W ], where z >= 1) Tx beacons that contain large CCN to neighboring BSs Impact of BF attacks Legitimate victim BSs lose the target channels. Drop in network throughput Z = 1 Simulation layout and results 31
32 Interfering with Inter-cell Synchronization Objective of BF attack Undermine efficacy of incumbent coexistence mechanism (spectrum sensing) Attack method Forge inter-cell beacons with spurious Frame Offset Impact of BF attack Victim BS performs frame sliding according to the spurious Frame Offset, which causes asynchrony of QPs. Asynchrony causes self-interference that degrades accuracy of spectrum sensing during QPs. Impact on misdetection probability (for energy detector) An incumbent signal is detected if Y > r (estimated Rx signal power, Y, is greater than threshold r ). Under BF attacks, self-interference in QPs causes the threshold to increase to a larger value, r *. * r * Miss detection probability increases by Pr( r Y r ) fy ( x) dx r 32
33 Countermeasures To thwart the forgery of inter-cell beacons, an inter-cell key management scheme is needed Utilize the backhaul infrastructure that connects multiple cells Employ a distributed key management scheme backhaul infrastructure 33
34 Chapter 15 Summary Emergence of the opportunistic spectrum sharing (OSS) paradigm and cognitive radio technology raises new security implications that have not been studied previously One countermeasure for primary user emulation attacks is transmitter verification; it is composed of 3 processes: Verification of signal characteristics Measurement of received signal energy level Localization of the signal source We can model the distributed spectrum sensing problem as a parallel fusion network to deal with Byzantine failures IEEE is vulnerable to attacks because its intercell beacons are not protected 34
A survey on Spectrum Management in Cognitive Radio Networks
A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
An overview of the IEEE 802.22 Standard
An overview of the IEEE 802.22 Standard P.Rastegari M.S student of the communication engineering The Electrical & Computer Department of Isfahan University of Technology, IUT E-Mail : [email protected]
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
Wi-Fi and Bluetooth - Interference Issues
Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
A Survey:Render of PUE Attack in Cognitive Radio Compressed by Software Defined Radio
International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) - 2016 A Survey:Render of PUE Attack in Cognitive Radio Compressed by Software Defined Radio Mandakini Gupta Dept.
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
A. Jraifi, R. A. Laamara, A. Belhaj, and E. H. Saidi Lab/UFR-groupe Canal Propagation Radio PHE, Faculté des Sciences, Rabat, Morocco
Progress In Electromagnetics Research C, Vol. 12, 15 25, 2010 A PROPOSAL SOLUTION FOR INTERFERENCE INTER-OPERATORS A. Jraifi, R. A. Laamara, A. Belhaj, and E. H. Saidi Lab/UFR-groupe Canal Propagation
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
SmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
How To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
A Survey on Rural Broadband Wireless Access Using Cognitive Radio Technology: IEEE 802.22 Wireless Regional Area Networks
Universal Journal of Communications and Network 1(1): 27-31, 2013 DOI: 10.13189/ujcn.2013.010105 http://www.hrpub.org A Survey on Rural Broadband Wireless Access Using Cognitive Radio Technology: IEEE
Inter-Cell Interference Coordination (ICIC) Technology
Inter-Cell Interference Coordination (ICIC) Technology Dai Kimura Hiroyuki Seki Long Term Evolution (LTE) is a promising standard for next-generation cellular systems targeted to have a peak downlink bit
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks
Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table
An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems
ICWMC 211 : The Seventh International Conference on Wireless and Mobile Communications An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2 1x EVDO and LTE Systems Xinsheng
DVB-T and Wireless Microphone Exclusion Area Computation Through Interference Analysis
SE43(11)Info 12 DVB-T and Wireless Microphone Exclusion Area Computation Through Interference Analysis Rogério Dionísio Instituto de Telecomunicações - Portugal 11th SE43 meeting, 19 September 2011 Page
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,
Mobility Management usually includes two parts: location management and handoff management.
Part 9: Mobile Data / Mobility Management I. Mobile Data Services/ Management This broad area involves a lot of industrial applications. Mobile data services/ management is becoming another profitable
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S [email protected], k [email protected],[email protected] Department of Computer Science,
How To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612
Spoofing Attack Detection and Localization of Multiple Adversaries in Wireless Networks S. Bhava Dharani, P. Kumar Department of Computer Science and Engineering, Nandha College of Technology, Erode, Tamilnadu,
- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
LTE on Shared Bands (LEONARD)
LTE on Shared Bands (LEONARD) Kari Rikkinen TEKES TRIAL seminar 15.02.2012 Renesas Mobile Corporation Department name 2012/3/28 Rev. 0.00 2010 Renesas Mobile Corporation. All rights reserved. 00000-A Introduction
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ
LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques
LTE in Unlicensed Spectrum: European Regulation and Co-existence Considerations
3GPP workshop on LTE in unlicensed spectrum Sophia Antipolis, France, June 13, 2014 RWS-140002 LTE in Unlicensed Spectrum: European Regulation and Co-existence Considerations Sari Nielsen & Antti Toskala
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Henrich C. Poehls Master s Thesis M.Sc. in Information Security Information Security Group Royal Holloway,
Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance
Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance Tamal Chakraborty 1, Atri Mukhopadhyay 2 1 Dept. of Electronics and Telecommunication Engineering 2 School of Mobile
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying
Location management Need Frequency Location updating
Lecture-16 Mobility Management Location management Need Frequency Location updating Fig 3.10 Location management in cellular network Mobility Management Paging messages Different paging schemes Transmission
VoIP-Kapazität im Relay erweiterten IEEE 802.16 System
VoIP-Kapazität im Relay erweiterten IEEE 802.16 System 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Karsten Klagges ComNets Research Group RWTH Aachen University 16. März 2012 Karsten Klagges
A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System
A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System Young Sil Choi Email: [email protected] Illsoo Sohn Email: [email protected] Kwang Bok Lee Email: [email protected] Abstract
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
Voice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
Exploiting Opportunistic Scheduling in Cellular Data Networks
Exploiting Opportunistic Scheduling in Cellular Data Networks Radmilo Racic, Denys Ma Hao Chen, Xin Liu University of California, Davis 1 3G Cellular Networks Provide high speed downlink data access Examples
SURVEY OF LTE AND LTE ADVANCED SYSTEM
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 5, May 2014, 1-6 Impact Journals SURVEY OF LTE AND LTE ADVANCED
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation 1 Doddapaneni.krishna Chaitanya, 2 Ghosh.Arindam Middlesex University Abstract Evaluation of Wireless Sensor Networks
High-Density Wi-Fi. Application Note
High-Density Wi-Fi Application Note Table of Contents Background... 3 Description... 3 Theory of Operation... 3 Application Examples... Tips and Recommendations... 7 2 Background One of the biggest challenges
Multiple Access Techniques
Chapter 8 Multiple Access Techniques Multiple access techniques are used to allow a large number of mobile users to share the allocated spectrum in the most efficient manner. As the spectrum is limited,
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
MIMO Antenna Systems in WinProp
MIMO Antenna Systems in WinProp AWE Communications GmbH Otto-Lilienthal-Str. 36 D-71034 Böblingen [email protected] Issue Date Changes V1.0 Nov. 2010 First version of document V2.0 Feb. 2011
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges
Multi-vendor Penetration Testing in the Advanced ing Infrastructure: Future Challenges DIMACS Workshop on Algorithmic Decision Theory for the Smart Grid Stephen McLaughlin - Penn State University 1 Data
SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE
SWASTIK K. BRAHMA Electrical Engineering & Computer Science Syracuse University Syracuse, NY 13244 Tel: (505) 948-1288 Email: [email protected] Web: http://skbrahma.mysite.syr.edu/ PROFESSIONAL EXPERIENCE
PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS
PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS A Guide to combating WLAN DoS Vulnerabilities Executive Summary Wireless communications that use a shared Radio Frequency (RF) medium are often vulnerable
VOICE OVER WI-FI CAPACITY PLANNING
VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
Figure 1: cellular system architecture
Question 1: (30 marks) Consider a FDM cellular system with 120 cites, a frequency reuse factor of N=12, and 900 overall two-way channels. Omni-directional antennas are used: Figure 1 shows some of the
CDMA Network Planning
CDMA Network Planning by AWE Communications GmbH www.awe-com.com Contents Motivation Overview Network Planning Module Air Interface Cell Load Interference Network Simulation Simulation Results by AWE Communications
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
White Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks
Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,
LTE BACKHAUL REQUIREMENTS: A REALITY CHECK
By: Peter Croy, Sr. Network Architect, Aviat Networks INTRODUCTION LTE mobile broadband technology is now being launched across the world with more than 140 service providers committed to implement it
RT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
Planning for 802.11ac Adoption with Ekahau Site Survey 6.0
Planning for 802.11ac Adoption with Ekahau Site Survey 6.0 1 P a g e w w w. e k a h a u. c o m / e s s Introduction to 802.11ac The emerging next generation Wi-Fi standard IEEE 802.11ac aims to break the
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Wireless Technologies for the 450 MHz band
Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed
1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6.
1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6. secure data communication. The access point periodically advertise
Cooperative Techniques in LTE- Advanced Networks. Md Shamsul Alam
Cooperative Techniques in LTE- Advanced Networks Md Shamsul Alam Person-to-person communications Rich voice Video telephony, video conferencing SMS/MMS Content delivery Mobile TV High quality video streaming
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse
Cellular Network Organization Cellular Wireless Networks Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of
SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS
SECTION 2 TECHNICAL DESCRIPTION OF SYSTEMS 2.1 INTRODUCTION Access equipment consists of injectors (also known as concentrators), repeaters, and extractors. injectors are tied to the backbone via fiber
TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii
TABLE OF CONTENTS Dedication Table of Contents Preface v vii xvii Chapter 1 Overview of Wireless Networks 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Signal Coverage Propagation Mechanisms 1.2.1 Multipath 1.2.2 Delay
End-to-end Cognitive Radio Testbed (EECRT ) current state and proposal for continuation TEKES TRIAL program
End-to-end Cognitive Radio Testbed (EECRT ) current state and proposal for continuation TEKES TRIAL program Department of Communications and Networking School of Electrical Engineering Aalto University
CDMA Performance under Fading Channel
CDMA Performance under Fading Channel Ashwini Dyahadray 05307901 Under the guidance of: Prof Girish P Saraph Department of Electrical Engineering Overview Wireless channel fading characteristics Large
