Chapter 15. Cognitive Radio Network Security

Size: px
Start display at page:

Download "Chapter 15. Cognitive Radio Network Security"

Transcription

1 Chapter 15 Cognitive Radio Network Security 1

2 Outline A taxonomy of CR security threats Primary user emulation attacks Byzantine failures in distributed spectrum sensing Security vulnerabilities in IEEE

3 Introduction Successful deployment of CR networks and the realization of their benefits will depend on the placement of essential security mechanisms Emergence of the opportunistic spectrum sharing (OSS) paradigm and cognitive radio technology raises new security implications that have not been studied previously Researchers have only recently started to examine the security issues specific to CR devices and networks 3

4 Some Recent Publications on CR Security R. Chen, J. Park, & J. Reed, Defense against primary user emulation attacks in cognitive radio networks, IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, Jan R. Chen, J. Park, T. Hou, & J. Reed, Toward secure distributed spectrum sensing in cognitive radio networks, IEEE Comm. Magazine, vol. 46, no. 4, S. Xiao, J. Park, and Y. Ye, Tamper Resistance for Software Defined Radio Software, IEEE Computer Software and Applications Conference, July K. Bian and J. Park, Security Vulnerabilities in IEEE , Fourth International Wireless Internet Conference, Nov

5 Some Recent Publications on CR Security T. Clancy, N. Goergen, Security in Cognitive Radio Networks: Threats and Mitigation, Int l Conference on Cognitive Radio Oriented Wireless Networks and Communications, May T.B. Brown and A. Sethi, Potential cognitive radio denial-ofservice vulnerabilities and protection countermeasures: a multi-dimensional analysis and assessment, Journal of Mobile Networks and Applications, vol. 13, no. 5, Oct A. Brawerman et al., Towards a fraud-prevention framework for software defined radio mobile devices, EURASIP Journal on Wireless Comm. and Networking, vol. 2005, no. 3, L.B. Michael et al., A framework for secure download for software-defined radio, IEEE Comm. Magazine, July P. Flanigan et al., Dynamic policy enforcement for software defined radio, 38 th Annual Simulation Symposium,

6 A Taxonomy of CR Security Threats CR network security threats Spectrum access - related security threats Radio software security threats Threats to incumbent coexistence mechanisms Spectral honeypots Sensory manipulation: - Primary user emulation - Geospatial manipulation - Chaff point attack - Spam point bias attack Obstruct synchronization of QPs Threats to selfcoexistence mechanisms Tx false/spurious inter-cell beacons (control messages) Exploit/obstruct inter-cell spectrum sharing processes Security threats to the software download process Injection of false/forged policies Injection of false/forged SW updates Injection of malicious SW (viruses) Software IP theft Software tampering Unauthorized policy changes Tampering w/ CR reasoners (e.g., System Strategy Reasoner & Policy Reasoner) 6

7 The Importance of Distinguishing Primary Users from Secondary Users Spectrum usage scenario for a secondary user Periodically search for spectrum white spaces (i.e., fallow bands) to transmit/receive data When a primary user is detected in its spectrum band Immediately vacate that band and switch to a vacant one vertical spectrum sharing When another secondary user is detected in its spectrum band When there are no better spectrum opportunities, it may choose to share the band with the detected secondary user horizontal spectrum sharing CR MAC protocol guarantees fair resource allocation among secondary users 7

8 Primary User Emulation Attacks Distributed Spectrum Sensing Primary signal transmitter Sensor Sensor Sensor Local spectrum sensing results Sensing data collector Data fusion Final spectrum sensing result Adversaries Signals with the same characteristics as primary signals Primary-User Emulation attack: An attacker emulates the characteristics of a primary signal transmitter 8

9 Existing Technique (1): Using Energy Detection to Conduct Spectrum Sensing Trust model An energy detector measures RF energy or the RSS to determine whether a given channel is idle or not Secondary users can recognize each other s signals and share a common protocol, and therefore are able to identify each other If an unidentified user is detected, it is considered a primary user 9

10 Existing Technique (1): Using Energy Detection to Conduct Spectrum Sensing Problem: If a malicious secondary user transmits a signal that is not recognized by other secondary users, it will be identified as a primary user by the other secondary users Interference to primary users Prevents other secondary users from accessing that band 10

11 Existing Technique (2): Matched Filter and Cyclostationary Feature Detection Trust model Matched filter and cyclostationary feature detectors are able to recognize the distinguishing characteristics of primary user signals Secondary users can identify each other s signals Problem: If a malicious secondary user transmits signals that emulate the characteristics of primary user signals, it will be identified as a primary user by the other secondary users Interference to primary users Prevents other secondary users from accessing that band 11

12 Existing Technique (3): Quiet Period for Spectrum Sensing Trust model Define a quiet period that all secondary users stop transmission. It is dedicated for spectrum sensing. Any user detected in the quiet period (using energy detector, matched filter or cyclostationary feature detector) is a primary user Problem: If a malicious secondary user transmits signals in the quiet period, it will be identified as a primary user by the other secondary users Interference to primary users Prevents other secondary users from accessing that band 12

13 The Disruptive Effects of Primary User Emulation Attacks Available link bandwidth (MHz) Selfish attackers Legitimate users Available link bandwidth (MHz) Number of pairs of selfish attackers Number of malicious attackers Selfish PUE attacks Malicious PUE attacks 13

14 Transmitter Verification for Spectrum Sensing Transmitter verification for spectrum sensing is composed of three processes: Verification of signal characteristics Measurement of received signal energy level Localization of the signal source 14

15 A Flowchart of transmitter verification 15

16 Challenges in PST Localization Primary signal transmitter (PST) localization is more challenging than the standard localization problem due to two reasons No modification should be made to primary users to accommodate the DSA of licensed spectrum. This requirement excludes the possibility of using a localization protocol that involves the interaction between a primary user and the localization device(s). PST localization problem is a non-interactive localization problem When a receiver is localized, one does not need to consider the existence of other receivers. However, the existence of multiple transmitters may add difficulty to transmitter localization 16

17 A solution to PST Localization Magnitude of an RSS value typically decreases as the distance between the signal transmitter and the receiver increases If one is able to collect a sufficient number of RSS measurements from a group of receivers spread throughout a large network, the location with the peak RSS value is likely to be the location of a transmitter. Advantage of this technique is twofold, Obviates modification of primary users and Supports localizing multiple transmitters that transmit signals simultaneously 17

18 Byzantine failures in distributed spectrum sensing Cause of Byzantine failures in distributed spectrum sensing (DSS) Malfunctioning sensing terminals Spectrum sensing data falsification (SSDF) attacks A malicious secondary user intentionally sends falsified local spectrum sensing reports to the data collector in an attempt to cause the data collector to make incorrect spectrum sensing decisions 18

19 SSDF Attacks 19

20 Modeling of DSS as a parallel fusion network We can model the DSS problem as a parallel fusion network 20

21 Data fusion algorithms for DSS Decision fusion Bayesian detection Neyman-Pearson test Weighted sequential probability ratio test (WSPRT) 21

22 The Coexistence Problem in CR Networks Incumbent coexistence Avoid serious interference to incumbent users Ex: spectrum sensing for detecting incumbent signals Ex: dynamic frequency hopping to avoid interfering with detected incumbents Why is self-coexistence important in CR networks? Minimize self interference between neighboring networks Need to satisfy QoS of networks admitted service workloads in a DSA environment Ex: prescribes inter-cell dynamic resource sharing mechanisms for better self-coexistence CR coexistence mechanisms can be exploited by adversaries Threats to incumbent coexistence mechanisms Threats to self-coexistence mechanisms 22

23 Operating Environment of Networks WRAN Base Station Incumbent services: TV broadcast services Part 74 devices (wireless microphones) Wireless microphones TV transmitters WRAN Base Station : WRAN Base Station Wireless microphones Typical ~33km Max. 100km : CPE (Consumer Premise Equipment) 23

24 PHY-Layer Support for Coexistence Two-stage spectrum sensing in quiet periods (QPs) Fast sensing stage: a quick and simple detection technique, e.g., energy detection. Fine sensing stage: measurements from fast sensing determine the need and duration of fine sensing stage. Synchronization of overlapping BSs QPs Channel Detection Time Fast sensing Fine sensing Channel Detection Time Fast sensing Fine sensing BS 1 Channel Detection Time Fast sensing Fine sensing Channel Detection Time Fast sensing Fine sensing BS 2 Channel Detection Time Fast sensing Fine sensing Channel Detection Time Fast sensing Fine sensing BS 3 Cognitive Radio Communications and Networks: Principles Fast sensing and Practice Fine sensing Time Transmission 24

25 Cognitive MAC (CMAC) Layer (1) Two types control messages Management messages: intra-cell management Beacons: inter-cell coordination Inter-cell synchronization Frame offset is contained in beacon payload The receiver BS performs frame sliding to synchronize with the transmitter BS. 25

26 Cognitive MAC (CMAC) Layer (2) Inter-BS dynamic resource sharing Needed when QoS of admitted service workload cannot be satisfied prescribes non-exclusive & exclusive spectrum sharing On-demand spectrum contention (ODSC) protocol Select a target channel to contend Each BS selects a Channel Contention Number (CCN) from [0,W]. BS with a greater CCN wins the pair-wise contention procedure. BS wins the channel if it wins all pair-wise contention procedures with all co-channel BSs. Inter-cell beacons used to carry out ODSC 26

27 Cognitive MAC (CMAC) Layer (3) Protection of Part 74 devices (wireless microphones) Class A solution A separate beacon device deployed Transmit short wireless microphone beacons (WMB) Use WMBs to notify collocated cells about operation of Part 74 devices Class B solution A special type of CPE is deployed Class B CPEs detect Part 74 device operations and notify other systems WRAN Base Station Class B CPE Wireless MIC 27

28 Overview of s Security Sublayer security sublayer provides confidentiality, authentication and integrity services for intra-cell management messages PKM (Privacy Key Management) protocol Encapsulation protocol It fails to protect inter-cell beacons used in coexistence mechanisms CMAC mechanisms protected by s security sublayer 28

29 Potential Security Threats DoS attacks Insertion of forged management messages by rogue terminals Prevented by use of mutual authentication and MACs Replay attacks Management messages: Prevented by use of nonces in challenge/response protocols Data packets: Thwarted using AES-CCM & packet numbers Threats against WMBs Class B CPEs possess pre-programmed keys that enable the use of authentication mechanisms to prevent WMB forgery/modification Spurious transmissions in QPs Interfere w/ various coexistence-related control mechanisms Primary user emulation Adversarial radio transmits signals whose characteristics emulate those of incumbent signals 29

30 Security Vulnerabilities in Inter-Cell Coexistence Mechanisms Inter-cell beacons are not protected by s security sublayer! Beacon Falsification (BF) attack Two types of BF attacks Tx of false/forged inter-cell beacons to disrupt spectrum contention processes Network throughput drop interfere with inter-cell synchronization Undermine the accuracy of spectrum sensing 30

31 Disrupting Inter-cell Spectrum Contention Objective of BF attacks Disrupt self-coexistence mechanisms (spectrum contention processes) Attack method Forge inter-cell beacons with arbitrarily large CCN value (e.g., select CCN from [W / z, W ], where z >= 1) Tx beacons that contain large CCN to neighboring BSs Impact of BF attacks Legitimate victim BSs lose the target channels. Drop in network throughput Z = 1 Simulation layout and results 31

32 Interfering with Inter-cell Synchronization Objective of BF attack Undermine efficacy of incumbent coexistence mechanism (spectrum sensing) Attack method Forge inter-cell beacons with spurious Frame Offset Impact of BF attack Victim BS performs frame sliding according to the spurious Frame Offset, which causes asynchrony of QPs. Asynchrony causes self-interference that degrades accuracy of spectrum sensing during QPs. Impact on misdetection probability (for energy detector) An incumbent signal is detected if Y > r (estimated Rx signal power, Y, is greater than threshold r ). Under BF attacks, self-interference in QPs causes the threshold to increase to a larger value, r *. * r * Miss detection probability increases by Pr( r Y r ) fy ( x) dx r 32

33 Countermeasures To thwart the forgery of inter-cell beacons, an inter-cell key management scheme is needed Utilize the backhaul infrastructure that connects multiple cells Employ a distributed key management scheme backhaul infrastructure 33

34 Chapter 15 Summary Emergence of the opportunistic spectrum sharing (OSS) paradigm and cognitive radio technology raises new security implications that have not been studied previously One countermeasure for primary user emulation attacks is transmitter verification; it is composed of 3 processes: Verification of signal characteristics Measurement of received signal energy level Localization of the signal source We can model the distributed spectrum sensing problem as a parallel fusion network to deal with Byzantine failures IEEE is vulnerable to attacks because its intercell beacons are not protected 34

A survey on Spectrum Management in Cognitive Radio Networks

A survey on Spectrum Management in Cognitive Radio Networks A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

An overview of the IEEE 802.22 Standard

An overview of the IEEE 802.22 Standard An overview of the IEEE 802.22 Standard P.Rastegari M.S student of the communication engineering The Electrical & Computer Department of Isfahan University of Technology, IUT E-Mail : [email protected]

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

chap18.wireless Network Security

chap18.wireless Network Security SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless

More information

Wi-Fi and Bluetooth - Interference Issues

Wi-Fi and Bluetooth - Interference Issues Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

A Survey:Render of PUE Attack in Cognitive Radio Compressed by Software Defined Radio

A Survey:Render of PUE Attack in Cognitive Radio Compressed by Software Defined Radio International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) - 2016 A Survey:Render of PUE Attack in Cognitive Radio Compressed by Software Defined Radio Mandakini Gupta Dept.

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

A. Jraifi, R. A. Laamara, A. Belhaj, and E. H. Saidi Lab/UFR-groupe Canal Propagation Radio PHE, Faculté des Sciences, Rabat, Morocco

A. Jraifi, R. A. Laamara, A. Belhaj, and E. H. Saidi Lab/UFR-groupe Canal Propagation Radio PHE, Faculté des Sciences, Rabat, Morocco Progress In Electromagnetics Research C, Vol. 12, 15 25, 2010 A PROPOSAL SOLUTION FOR INTERFERENCE INTER-OPERATORS A. Jraifi, R. A. Laamara, A. Belhaj, and E. H. Saidi Lab/UFR-groupe Canal Propagation

More information

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate

More information

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area

More information

SmartDiagnostics Application Note Wireless Interference

SmartDiagnostics Application Note Wireless Interference SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine

More information

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

How To Secure Wireless Networks

How To Secure Wireless Networks Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements

More information

A Survey on Rural Broadband Wireless Access Using Cognitive Radio Technology: IEEE 802.22 Wireless Regional Area Networks

A Survey on Rural Broadband Wireless Access Using Cognitive Radio Technology: IEEE 802.22 Wireless Regional Area Networks Universal Journal of Communications and Network 1(1): 27-31, 2013 DOI: 10.13189/ujcn.2013.010105 http://www.hrpub.org A Survey on Rural Broadband Wireless Access Using Cognitive Radio Technology: IEEE

More information

Inter-Cell Interference Coordination (ICIC) Technology

Inter-Cell Interference Coordination (ICIC) Technology Inter-Cell Interference Coordination (ICIC) Technology Dai Kimura Hiroyuki Seki Long Term Evolution (LTE) is a promising standard for next-generation cellular systems targeted to have a peak downlink bit

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0 LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table

More information

An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems

An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems ICWMC 211 : The Seventh International Conference on Wireless and Mobile Communications An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2 1x EVDO and LTE Systems Xinsheng

More information

DVB-T and Wireless Microphone Exclusion Area Computation Through Interference Analysis

DVB-T and Wireless Microphone Exclusion Area Computation Through Interference Analysis SE43(11)Info 12 DVB-T and Wireless Microphone Exclusion Area Computation Through Interference Analysis Rogério Dionísio Instituto de Telecomunicações - Portugal 11th SE43 meeting, 19 September 2011 Page

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology

More information

Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks

Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,

More information

Mobility Management usually includes two parts: location management and handoff management.

Mobility Management usually includes two parts: location management and handoff management. Part 9: Mobile Data / Mobility Management I. Mobile Data Services/ Management This broad area involves a lot of industrial applications. Mobile data services/ management is becoming another profitable

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

The next generation of knowledge and expertise Wireless Security Basics

The next generation of knowledge and expertise Wireless Security Basics The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

More information

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S [email protected], k [email protected],[email protected] Department of Computer Science,

More information

How To Understand The Gsm And Mts Mobile Network Evolution

How To Understand The Gsm And Mts Mobile Network Evolution Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

Problems of Security in Ad Hoc Sensor Network

Problems of Security in Ad Hoc Sensor Network Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless

More information

International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612

International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612 Spoofing Attack Detection and Localization of Multiple Adversaries in Wireless Networks S. Bhava Dharani, P. Kumar Department of Computer Science and Engineering, Nandha College of Technology, Erode, Tamilnadu,

More information

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science

More information

An Overview of ZigBee Networks

An Overview of ZigBee Networks An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

LTE on Shared Bands (LEONARD)

LTE on Shared Bands (LEONARD) LTE on Shared Bands (LEONARD) Kari Rikkinen TEKES TRIAL seminar 15.02.2012 Renesas Mobile Corporation Department name 2012/3/28 Rev. 0.00 2010 Renesas Mobile Corporation. All rights reserved. 00000-A Introduction

More information

WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network

WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ

LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques

More information

LTE in Unlicensed Spectrum: European Regulation and Co-existence Considerations

LTE in Unlicensed Spectrum: European Regulation and Co-existence Considerations 3GPP workshop on LTE in unlicensed spectrum Sophia Antipolis, France, June 13, 2014 RWS-140002 LTE in Unlicensed Spectrum: European Regulation and Co-existence Considerations Sari Nielsen & Antti Toskala

More information

Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth

Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Henrich C. Poehls Master s Thesis M.Sc. in Information Security Information Security Group Royal Holloway,

More information

Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance

Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance Tamal Chakraborty 1, Atri Mukhopadhyay 2 1 Dept. of Electronics and Telecommunication Engineering 2 School of Mobile

More information

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying

More information

Location management Need Frequency Location updating

Location management Need Frequency Location updating Lecture-16 Mobility Management Location management Need Frequency Location updating Fig 3.10 Location management in cellular network Mobility Management Paging messages Different paging schemes Transmission

More information

VoIP-Kapazität im Relay erweiterten IEEE 802.16 System

VoIP-Kapazität im Relay erweiterten IEEE 802.16 System VoIP-Kapazität im Relay erweiterten IEEE 802.16 System 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Karsten Klagges ComNets Research Group RWTH Aachen University 16. März 2012 Karsten Klagges

More information

A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System

A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System Young Sil Choi Email: [email protected] Illsoo Sohn Email: [email protected] Kwang Bok Lee Email: [email protected] Abstract

More information

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G. Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics

More information

Voice Service Support over Cognitive Radio Networks

Voice Service Support over Cognitive Radio Networks Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,

More information

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,

More information

Exploiting Opportunistic Scheduling in Cellular Data Networks

Exploiting Opportunistic Scheduling in Cellular Data Networks Exploiting Opportunistic Scheduling in Cellular Data Networks Radmilo Racic, Denys Ma Hao Chen, Xin Liu University of California, Davis 1 3G Cellular Networks Provide high speed downlink data access Examples

More information

SURVEY OF LTE AND LTE ADVANCED SYSTEM

SURVEY OF LTE AND LTE ADVANCED SYSTEM IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 5, May 2014, 1-6 Impact Journals SURVEY OF LTE AND LTE ADVANCED

More information

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation 1 Doddapaneni.krishna Chaitanya, 2 Ghosh.Arindam Middlesex University Abstract Evaluation of Wireless Sensor Networks

More information

High-Density Wi-Fi. Application Note

High-Density Wi-Fi. Application Note High-Density Wi-Fi Application Note Table of Contents Background... 3 Description... 3 Theory of Operation... 3 Application Examples... Tips and Recommendations... 7 2 Background One of the biggest challenges

More information

Multiple Access Techniques

Multiple Access Techniques Chapter 8 Multiple Access Techniques Multiple access techniques are used to allow a large number of mobile users to share the allocated spectrum in the most efficient manner. As the spectrum is limited,

More information

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram. Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech

More information

MIMO Antenna Systems in WinProp

MIMO Antenna Systems in WinProp MIMO Antenna Systems in WinProp AWE Communications GmbH Otto-Lilienthal-Str. 36 D-71034 Böblingen [email protected] Issue Date Changes V1.0 Nov. 2010 First version of document V2.0 Feb. 2011

More information

ITL BULLETIN FOR AUGUST 2012

ITL BULLETIN FOR AUGUST 2012 ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division

More information

Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges

Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges Multi-vendor Penetration Testing in the Advanced ing Infrastructure: Future Challenges DIMACS Workshop on Algorithmic Decision Theory for the Smart Grid Stephen McLaughlin - Penn State University 1 Data

More information

SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE

SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE SWASTIK K. BRAHMA Electrical Engineering & Computer Science Syracuse University Syracuse, NY 13244 Tel: (505) 948-1288 Email: [email protected] Web: http://skbrahma.mysite.syr.edu/ PROFESSIONAL EXPERIENCE

More information

PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS

PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS A Guide to combating WLAN DoS Vulnerabilities Executive Summary Wireless communications that use a shared Radio Frequency (RF) medium are often vulnerable

More information

VOICE OVER WI-FI CAPACITY PLANNING

VOICE OVER WI-FI CAPACITY PLANNING VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited

More information

Security and protection of digital images by using watermarking methods

Security and protection of digital images by using watermarking methods Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking

More information

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Preventing Resource Exhaustion Attacks in Ad Hoc Networks Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585

More information

Figure 1: cellular system architecture

Figure 1: cellular system architecture Question 1: (30 marks) Consider a FDM cellular system with 120 cites, a frequency reuse factor of N=12, and 900 overall two-way channels. Omni-directional antennas are used: Figure 1 shows some of the

More information

CDMA Network Planning

CDMA Network Planning CDMA Network Planning by AWE Communications GmbH www.awe-com.com Contents Motivation Overview Network Planning Module Air Interface Cell Load Interference Network Simulation Simulation Results by AWE Communications

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,

More information

LTE BACKHAUL REQUIREMENTS: A REALITY CHECK

LTE BACKHAUL REQUIREMENTS: A REALITY CHECK By: Peter Croy, Sr. Network Architect, Aviat Networks INTRODUCTION LTE mobile broadband technology is now being launched across the world with more than 140 service providers committed to implement it

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

Planning for 802.11ac Adoption with Ekahau Site Survey 6.0

Planning for 802.11ac Adoption with Ekahau Site Survey 6.0 Planning for 802.11ac Adoption with Ekahau Site Survey 6.0 1 P a g e w w w. e k a h a u. c o m / e s s Introduction to 802.11ac The emerging next generation Wi-Fi standard IEEE 802.11ac aims to break the

More information

Complete Protection against Evolving DDoS Threats

Complete Protection against Evolving DDoS Threats Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion

More information

Wireless Technologies for the 450 MHz band

Wireless Technologies for the 450 MHz band Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed

More information

1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6.

1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6. 1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6. secure data communication. The access point periodically advertise

More information

Cooperative Techniques in LTE- Advanced Networks. Md Shamsul Alam

Cooperative Techniques in LTE- Advanced Networks. Md Shamsul Alam Cooperative Techniques in LTE- Advanced Networks Md Shamsul Alam Person-to-person communications Rich voice Video telephony, video conferencing SMS/MMS Content delivery Mobile TV High quality video streaming

More information

Link Layer and Network Layer Security for Wireless Networks

Link Layer and Network Layer Security for Wireless Networks Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.

More information

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse Cellular Network Organization Cellular Wireless Networks Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of

More information

SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS

SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS SECTION 2 TECHNICAL DESCRIPTION OF SYSTEMS 2.1 INTRODUCTION Access equipment consists of injectors (also known as concentrators), repeaters, and extractors. injectors are tied to the backbone via fiber

More information

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii TABLE OF CONTENTS Dedication Table of Contents Preface v vii xvii Chapter 1 Overview of Wireless Networks 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Signal Coverage Propagation Mechanisms 1.2.1 Multipath 1.2.2 Delay

More information

End-to-end Cognitive Radio Testbed (EECRT ) current state and proposal for continuation TEKES TRIAL program

End-to-end Cognitive Radio Testbed (EECRT ) current state and proposal for continuation TEKES TRIAL program End-to-end Cognitive Radio Testbed (EECRT ) current state and proposal for continuation TEKES TRIAL program Department of Communications and Networking School of Electrical Engineering Aalto University

More information

CDMA Performance under Fading Channel

CDMA Performance under Fading Channel CDMA Performance under Fading Channel Ashwini Dyahadray 05307901 Under the guidance of: Prof Girish P Saraph Department of Electrical Engineering Overview Wireless channel fading characteristics Large

More information