The Security of Physical Layer in Cognitive Radio Networks
|
|
|
- Aubrie Osborne
- 10 years ago
- Views:
Transcription
1 The Security of Physical Layer in Cognitive Radio Networks Yi-cheng Yu, Liang Hu, Hong-tu Li, Yuan-mo Zhang, Fang-ming Wu, and Jian-feng Chu * Jilin University, Chang Chun , China [email protected]; {hul, chujf}@jlu.edu.cn; [email protected]; [email protected]; @qq.com Abstract Cognitive Radio (CR) is a novel technology that promises to solve the lack of spectrum by allowing secondary users to use licensed band, so that they can coexist with primary users without causing interference to their communications. With the development of CR, extending to the level of network, cognitive radio networks (CRNs) emerge as the times require. Nowadays the operational aspects of CRN are being explored vigorously, and several potential security challenges for cognitive radio have gained lots of attention. In this paper, we explore the security issues on physical layer for cognitive radio networks. First, we give a brief overview of the CRNs, then we review several existing secure threats to the physical layer in CRNs and we propose a new kind of security problem. Next, we discuss the related countermeasures on how to defend against these attacks. Subsequently, we conduct an evaluation of these countermeasures, and make some future works for secure CRNs. At last, we make the conclusion. Index Terms Cognitive radio networks, physical layer, security threats, countermeasures against attacks, primary users location attack I. INTRODUCTION Due to the rapid development of wireless communication, the fixed spectrum allocation cannot meet the demand for more and more users. In view of this, the Federal Communication Commission (FCC) approves new rules to allow unlicensed users to utilize the spectrum reserved for wireless broadband services in 2010, and Cognitive Radio Networks (CRNs) have been proposed as a strong candidate to solve the problem. The concept of Cognitive Radio (CR) was first pioneered by the Joseph Mitola from software defined radio (SDR) in 1999 [1], and Mitola pointed out that cognitive radio is a special extension of software radio and more flexibility than software radio. Cognitive radio is a new research area for wireless communication [2]-[6], and lots of scholars have researched in this field in recent years [7]-[14]. In 2005, Haykins propsed a definition of cognitive radio, he hold that cognitive radio is an intelligent wireless Manuscript received August 24, 2014; revised December 25, This work was supported by the Deep exploration instrumentation and equipment development (SinoProbe ) under Grant No Corresponding author [email protected]. doi: /jcm communication system that is aware of its surrounding environment, and uses the methodology of understanding-by-building to learn from the environment and adapt its internal states to statistical variations in the incoming RF stimuli by making corresponding changes in certain operating parameters in real time, with two primary objectives in mind: highly reliable communication, whenever and wherever needed, and efficient utilization of the radio spectrum" [15]. In 2008, Chen et al. stated that cognitive radios could take the opportunity to make communication with the spectrum holes in order to successfully facilitate useful services and applications [16]. With the development of cognitive radio, extending to the level of network, the cognitive radio network can utilize idle licensed spectrum, thereby improving the utilization of spectrum resources to meet the demand for more spectrum for wireless users. Because of the physical characteristics of CRNs where various unknown wireless devices are allowed to opportunistically access the licensed spectrum, several types of attacks on physical layer in CRNs has been attracting continuously growing attention. And we need to take security measures to combat attacks launched by malicious attackers. We then present these attacks on physical layer in CRNs and evaluate corresponding countermeasures showing their advantages and disadvantages. The rest of the paper is organized as follows. In Section 2, we present an overview of CRNs. Section 3 addresses the different types of secure threats on physical layer in CRNs. And we discuss and evaluate the countermeasures against these attacks on physical layer in Section 4. Subsequently, we make some future works for secure CRNs in Section 5. In Section 6, we make the conclusion. II. BRIEF OVERVIEW OF CRNS A. The Architecture of CRNs There are various kinds of communications in CRNs, which can be viewed as types of heterogeneous networks. In CRNs, there are three basic components: mobile station (), base station/access point () and backbone/core networks. To improve the entire network utilization effectively, three different architectures are 916
2 Journal of Communications Vol. 9, No. 12, December 2014 comprised of these three basic components: Infrastructure, Ad-Hoc and Mesh [16]. An infrastructure CRN has a central network entity, such as a BS in cellular networks or an AP in wireless local area networks (LANs). An can access a only in a one-hop manner. s in same cell communicate with each other through the and communications between devices in different cells are routed by the, as shown in Fig. 1. Backbone/Core Networks Fig. 1. Infrastructure architecture. In Ad-Hoc architecture, CRNs are formed by devices without infrastructure support. s can set up links between each other with different communication protocols. Each is responsible for determining its next events based on the local information that it observes. cannot predict the influence of its actions on the entire network based on its local observation, so it is important to design cooperation schemes for exchanging information from other s, as shown in Fig. 2. the wireless environment network. Next fusion centers make intelligent analysis. Then base stations make optimal decisions to make re-configuration. Last cognitive users take advantage of the spectrum resources according to the decision result, the entire process is called "cognitive cycle", which is first proposed by Joseph Mitola in 1999 [1]. As shown in Fig. 4, cognitive cycle is composed of spectrum sensing, analysis, decision-making and communication. In network-centric CRNs, cognitive users sense spectrum of the wireless environment, then upload the data to fusion centers, according to the received data, which make analysis to obtain the list of idle channels and inform base stations. When cognitive users request for allocation of available channels, base stations make decisions to assign channels to them according to certain rules. And cognitive users can communicate by the assigned channels. In distributed CRNs, cognitive users sense the spectrum of the wireless environment, then transmit the data to other users. So each of cognitive users could get the same data and reach a same list of the available spectrum. And, in accordance with certain competitive mechanism of resource allocation, available channels would be assigned to cognitive users for communication. Spectrum Hole Information Feedback Radio Environment Analysis Feedback Communication Decision Making Channel Capacity Assigned Channel Fig. 2. Ad-Hoc architecture. Fig. 4. The cognitive cycle. Mesh architecture is basically a combination of infrastructure and ad hoc.s are allowed to connect to the directly or through other neighboring s as multi-hop relay nodes, as shown in Fig. 3. III. PHYSICAL LAYER SECURE THREATS IN CRNS A. Primary User Emulation Attack In CRNs, a secondary user need to detect the primary user is active or not when he tries to occupy a specific channel. And he is allowed to use the specific band while it s not occupied by a primary user. Once the presence of a primary user is detected, the secondary user should switch channels immediately to an idle channel [17, 18]. If the secondary user detects the identical band is occupied by another secondary user, spectrum sharing mechanisms should be used in order to achieve spectrum fairly. A primary user emulation (PUE) attacker may disguise himself as a primary user by transmitting special signals in the licensed band, thus leading to other secondary users mistakenly believe primary user s existing. The secondary users who regard the attackers as primary users Fig. 3. Mesh architecture. B. The Cognitive Cycle In network-centric CRNs (such as infrastructure architecture), Cognitive radio nodes sense spectrum of 917
3 Journal of Communications Vol. 9, No. 12, December 2014 need to give up accessing the band. Therefore, the attack would succeed in preventing secondary users from accessing this channel. Up to now, there exist several types of PUE attacks [19], including selfish PUE attack, malicious PUE attack and some more complicated PUE attacks. In a selfish PUE attack, two attackers establish an appropriative link between them simultaneously to increase their share of the spectrum resources. In a malicious PUE attack, the attacker s goal is to prevent the transmission of the secondary users without using the vacant channel. And in some more complicated PUE attacks, malicious node is capable of attacking the network only when the primary user is off, so that they can save energy to do more effective attacks. Fig. 5 shows the PUE attack in network-centric CRNs. Malicious Malicious user user CRNs, sensing terminals learn the history, feedback and adjust radio parameters according to current environment in the process of spectrum sensing, analysis, decisionmaking and communication. In a learning attack (LA) [21], learning radio learns false sensory input provided by attacks. And these wrong ideas about the transmission schemes would be studied all the way. This would exert long-term effects on subsequent operations, and it can t guarantee the best fit with the actual network environment. Usually, learning attack would be launched combining with other types of attacks such as PUE attacks and OFA attacks. D. Jamming Because of the available channel s open, malicious nodes may randomly attack some available channels by jamming. There by, interrupting the communication between CRs. The malicious node may continuously transmit high-power signals on multiple channels. At this time, the user is assigned to an idle channel, but the normal communication can not be performed. When Multiple CRs are under jamming attacks in the same channel, they would feedback the experience of poor quality to BS. This would reduce the allocation for this channel, so that a malicious user can communicate with this channel [22]. Terminal Terminal Final spectrum sensing result Terminal Terminal Fusion Fusion center center Primary Primary user user Terminal Terminal Fig. 5. Primary user emulation attack in network-centric CRNs. B. Objective Function Attack Cognitive radio is flexible, and is capable of sensing the external environment, learning from the history, and making intelligent decisions to adapt to the changing environment [20], The cognitive engine in the adaptive cognitive radio has the ability to tune many radio parameters to meet specific requirements such as high transmission data rate, low delay, high security level and low power consumption. Such radio parameters include bandwidth, power, modulation type, coding rate, MAC protocol, routing schemes, encryption mechanisms, and frame size [21]. These parameters are calculated by solving one or more objective functions, however, some objective function are directly related to the inputs of users in the channel. When cognitive engine is running to calculate the radio parameters appropriate to the current environment, the attacker can make the results tailored and biased through same way. The attack is called objective function attack (OFA) [21] and the process is shown in Fig. 6. Attacker A Attacker A Attacker A fuse Ultimate object optimize... Attacker B (1) Method A Sub-goal object Sub-goal Sub-goal object PU PU Parameters setting (2) Method B Sub-goal object Attacker Fig. 7. Primary users location attack. Fig. 6. Objective function attack. E. Eavesdropping In an eavesdropping attack, a malicious node would listen to the transmission of the legitimate users, fusion C. Learning Attack Cognitive radio is smart, intelligent and cognitive. In 918
4 center and base station for obtaining some information about available channel. And the attacker may calculate channels which would be switched according to the algorithm of channel selection. Eavesdropping itself does not have a negative effect on cognitive radio network. However, as an assistence to achieve the purpose of attackers, it s the basis of other attacks. F. Primary Users Location Attack In addition to the secure threats above have been proposed, we propose a new kind of attack which can obtain the location of primary users, thereby launching a direct physical attack on the equipment. In CRNs, each user can detect the signal emitted by primary user, an attacker can calculate the range of the distance between the primary user and itself according to the strength of the signal. When multiple attackers estimate the position of the primary user with this method, they can get a crossover region to narrow down the area where the primary user is located in, as shown in Method A in Fig. 7. Meanwhile, the attackers can narrow the scope further by their mobility, and ultimately get the primary user's location as shown in Method B in Fig. 7. According to the location of primary user, the attacker can find the primary user and launch a physical attack on it directly, which would make the primary user disable. IV. COUNTERMEASURES AGAINST ATTACKS ABOVE In this section we will discuss the schemes against secure threats mentioned above, we first list the recent countermeasures and then evaluate them. A. Defending Against PUE Attack To defend against PUE attacks, the identity of the transmitting source needs to be identified, and many solutions have been proposed to determine the identity of the signal source [23]-[25], [27]-[30]. Chen et al. successively proposed several solutions to defend against PUE attack: Distance Ratio Test (DRT) [23], Distance Difference Test (DDT) [23] and Localization-based Defense (LocDef) [24]. In these schemes, secondary users determine whether the signal is transmitted by primary users by estimating the position of the signal source and observing the sign's characteristics. They employ RSS-based localization that exploits the relationship between signal strength and a transmitter location to obtain the location of the signal. However, these solutions could only be applied to the CRNs in which primary user's location is fixed, but the networks where mobile primary users cannot be applied. Jin et al. presented an analysis using Fenton s approximation and Wald s sequential probability ratio test (WSPRT) to detect PUE attack [25]. They considered a fading wireless environment and derived expressions for the probability of successful PUE attack employing Fenton s approximation. Then they made use of Markov inequality to provide a lower bound on the probability of successful PUE attack. Finally, WSPRT was exploited to detect PUE attack. However, this method has strict requirements on the primary user. A primary user should be located at some distance from all the users, and position fixing. In 2012, Yuan et al. proposed a defense strategy against the PUE attack in CRNs using belief propagation [26]. In their scheme, each secondary user calculates the local function and the compatibility function, computes the messages, exchanges messages with the neighboring users, and calculates the beliefs until convergence. Then, the PUE attacker would be detected, and all the secondary users in the network would be notified in a broadcast way about the characteristics of the attacker s signal. Simulation results show that this approach converges quickly, and is effective to detect the PUE attack. B. Defending Against Objective Function Attack The research on objective function attack is not mature, no good solution has been suggested to defend against it. In [31], Olga León et al. suggested defining threshold values for every updatable radio parameter and only when the parameters meet the thresholds can communication start. However, there is no mature scheme with this method. In 2011, Pei et al. proposed an appropriate proposal called MOP (Multi-objective programming model) [32]. After attackers obtain all the parameters, secondary users detect them and compare them with fitness value with MOP to decide whether attackers exist. If so, then secondary user readjusts the tampered parameters to optimal settings. This scheme is able to detect the specific objective function which is tampered, and make reasonable regulation. Even if attackers obtain the parameters, they cannot tamper the parameters. So this scheme can effectively resist OFA if MOP is security. C. Defending Against Learning Attack Some suggestions have been made to defend against learning attacks [21]. First, the learning results must always be under constant reevaluation. A feedback loop should constantly be updating learned relationships between cognitive radio inputs and outputs. Second, there should be a truly controlled environment during the learning phases, which means no adversarial signals are present during the learning phase. Third, the action which breaks to some basic theoretic results should not be exploited. Fourth, cognitive radios had better make use of group learning instead of individual learning. Therefore the attacker cannot launch a learning attack so easily. D. Defending Against Jamming To mitigate the jamming attacks, several solutions have been proposed [33]-[39]. Secondary users need to detect that a jamming attack really exists in order to counter jamming attacks. In [33] the author suggested collecting enough data of the noise to detect jamming attacks. So secondary users can differentiate the 919
5 Journal of Communications Vol. 9, No. 12, December 2014 interference of an attacker from normal noise when attackers try to jam secondary users and transmit large power interference. Spread spectrum (SS) [34] and frequency hopping (FH) [35] techniques also turn out to be effective against jamming attacks. SS makes the signal more robust to interference by spreading it over a large frequency band. In the scheme using FH, Whenever the secondary users find the jamming attack, they would switch to other channels that are not jammed with their high switching ability. FH is capable of reducing the probability that the frequency involved in the current communication is targeted by the jammer. convex max-min problem to maximize secrecy capacity without interfering with primary users. The maximum achievable secrecy rate can be obtained by optimizing the transmit covariance matrix in the case of Gaussian input. Algorithms were proposed to compute the maximum achievable secrecy rate for the case of single-antenna eavesdroppers, and bounds on the achievable secrecy rate were obtained for general cases with multi-antenna secrecy and eavesdropper receivers. Secrecy rate can be improved in the scheme. F. Defending Against Primary Users Location Attack Since attackers estimate the range of the distance between primary user and themselves according to the strength of the signal, for defending against this kind of attack, the signal s strength and the distance between them should not have a linear relationship. To our point of view, primary users can resist the attacks by changing the intensity of signals irregularly. E. Defending Against Eavesdropping There is still no perfect solution to effectively resist learning attack. Zhang et al. proposed an idea employing power control algorithms to increase the rate among the legitimate users while decreasing the rate to the eavesdroppers [40]. In this scheme, secondary users exploit multiple input multiple output (MIMO) transmission, primary users employ a single antenna, and eavesdroppers can use either multiple antennas or a single antenna. They studied the achievable rates of the MIMO secrecy rate between secondary users, and formed a non- G. The Evaluation of the Countermeasures In Table I, we present the evaluation of the attacks countermeasures of the physical layer. TABLE I: PHYSICAL LAYER ATTACKS, COUNTERMEASURES AND EVALUATIONS IN CRNS Attack PUE Countermeasure Evaluation Distance Ratio Test (DRT) [23] Secondary users can detect PUE attack in the process of spectrum sensing using this method, but the solution could only be applied to the CRNs in which primary user's location is fixed Distance Difference Test (DDT) [23] Be identical to DRT Localization-based Defense (LocDef) [24] Be identical to DRT Use Fenton s approximation and Wald s sequential probability ratio test (WSPRT) to detect PUE attack [25] Secondary user can detect PUE attack alone, but primary users should be located at some distance from all the users, and position is fixed The solution converges quickly, and is effective to detect the PUE attacker It is important to set the thresholds in this scheme, and the fixed thresholds may be unreasonable If the MOP is secure, this scheme can effectively resist OFA The suggestion can defend the attack to a certain extent It is hard to define the appropriate amount of data should be exploited to build the model SS makes the signal more robust to interference Use belief propagation [26] OFA Define threshold values for every updatable radio parameter and only the parameters meet the thresholds can communication start [31] MOP (Multi-objective programming model) [32] LA The learning results must always be reevaluated over time [21] Collect enough data of the noise to detect jamming attacks [33] Jamming Spread spectrum (SS) [34] Frequency hopping (FH) [35] Frequency hopping is good for cognitive radios Eavesdropping Power control [40] Secrecy rate can be improved Primary Users Location Attack Changing the intensity of signals irregularly Location information can be protected The current schemes are designed for resisting a certain attack on physical layer in CRNs. Even if the scheme can effectively resist a certain attack, it cannot withstand other attacks on physical layer. The next step, it is vital to establish a sound scheme to resist all of attacks. V. THE FUTURE WORKS FOR THE SECURE CRNS In this section, we focus on the future works of the security of the physical layer in CRNs to make cognitive radio networks safer and work more effectively. 920
6 In network-centric CRNs, base station gets the current environmental information via secondary users sensing. In one case, malicious nodes may tamper the data submitted to base station. In the other case, some malicious secondary users may transmit some wrong data to base station. Adding the role of primary user into the cognitive cycle makes it more reasonable. For example, when the primary user needs to exploit a particular channel, it can notify the base station in advance. Hence, when secondary users attempt to cheat the base station into believing that the channel is idle, it would not be succeed. It is important to trace to the transmitter in CRNs. When receiving a deceived data, the recipient should be capable of finding the transmitter. However, the signature mechanism is not applied to CRNs, so it is vital to solve this problem. For making a better judgment, base stations make decisions referring to the history in network-centric CRNs. However, once the wrong information has been studied, which would always affect the final decision. In my opinion, base station should evaluate the history regularly. VI. CONCLUSIONS Cognitive Radio (CR) technology is one of the strong candidate technologies to alleviate spectrum shortage problem in wireless communications. The development of cognitive radio leads to the research of cognitive radio networks. This research work focuses on the physical layer security issues of Cognitive Radio Networks (CRNs). Not only the most important secure threats on physical layer have been addressed, but also a new kind of attack has been proposed in this paper. Then we discuss the related countermeasures on how to defend against these attacks. Finally, we conduct an evaluation of these countermeasures, and make some future works for the secure CRNs. ACKNOWLEDGMENT This work was supported in part from Deep exploration instrumentation and equipment development (SinoProbe ). REFERENCES [1] J. Mitola and G. Q. Maguire Jr, Cognitive radio: Making software radios more personal, Personal Communications. IEEE, vol. 6, no. 4, pp , [2] S. S. Ivrigh, S. Siavash, and S. M. S. Sadough, Spectrum sensing for cognitive radio networks based on blind source separation, KSII Transactions on Internet & Information Systems, vol. 4, pp , [3] G. P. Joshi, S. Y. Nam, and S. W. Kim, Cognitive radio wireless sensor networks: applications, challenges and research trends, Sensors, vol. 9, pp , [4] V. Gardellin, S. K. Das, and L. Lenzini, Coordination problem in cognitive wireless mesh networks, Pervasive and Mobile Computing, vol. 1, pp , [5] B. Luca, O. Marina, R. Mirco, et al., Comparison among cognitive radio architectures for spectrum sensing, EURASIP Journal on Wireless Communications and Networking, [6] S. Chang, K. Nagothu, B. Kelley, et al., A Beamforming Approach to Smart Grid Systems Based on Cloud Cognitive Radio, [7] J. Feng, G. Lu, and X. Min, Social incentives for cooperative spectrum sensing in distributed cognitive radio networks, KSII Transactions on Internet and Information Systems, vol. 2, pp , [8] K. Arshad, R. MacKenzie, U. Celentano, et al., Resource management for QoS support in cognitive radio networks, Communications Magazine. IEEE, vol. 3, pp , [9] S. M. Dudley, et al., Practical issues for spectrum management with cognitive radios, Proceedings of the IEEE, vol. 102, no. 3, pp , [10] J. Huang, H. Zhou, Y. Chen, et al., Distributed and centralized schemes for channel sensing order setting in multi-user cognitive radio networks, Wireless Personal Communications, vol. 2, pp. 1-20, [11] G. Ding, Q. Wu, Y. Zou, et al., Joint spectrum sensing and transmit power adaptation in interference-aware cognitive radio networks, Transactions on Emerging Telecommunications Technologies, [12] Z. Feng, Z. Wei, Q. Zhang, et al., Cognitive information metrics for cognitive wireless networks, Chinese Science Bulletin, vol. 17, pp , [13] P. S. M. Tripathi, A. Chandra, and R. Prasad, Deployment of cognitive radio in India, Wireless Personal Communications, vol. 3, pp , [14] D. Cabric, S. M. Mishra, and R. W. Brodersen, Implementation issues in spectrum sensing for cognitive radios, in Proc. Thirty- Eighth Asilomar Conference on Signals, Systems and Computers, vol. 1, [15] S. Haykin, Cognitive radio: Brain-empowered wireless communications, Selected Areas in Communications, vol. 2, pp , [16] K. C. Chen, Y. J. Peng, and N. Prasad, et al., Cognitive radio network architecture: Part I--general structure, in Proc. 2nd International Conference on Ubiquitous Information Management and Communication, 2008, pp [17] Q. Liu, Z. Zhou, C. Yang, et al., The coverage analysis of cognitive radio network, in Proc. 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008, pp [18] A. N. Mody, R. Reddy, T. Kiernan, et al., Security in cognitive radio networks: An example using the commercial IEEE standard, in Proc. Military Communications Conference, IEEE, 2009, pp [19] W. El-Hajj, H. Safa, and M. Guizani, Survey of security issues in cognitive radio networks, Journal of Internet Technology, vol. 2, pp , [20] Q. Mahmoud, Cognitive networks: Towards self-aware networks, Wiley E-Book, New York, [21] T. C. Clancy and N. Goergen, Security in cognitive radio networks: Threats and mitigation, in Proc. 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, IEEE, [22] A. Sampath, H. Dai, H. Zheng, et al., Multi-channel jamming attacks using cognitive radios, in Proc. 16th International Conference on Computer Communications and Network, IEEE, [23] R. Chen and J. M. Park, Ensuring trustworthy spectrum sensing in cognitive radio networks, in Proc. 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks, IEEE, 2006, pp [24] R. Chen, J. M. Park, and J. H. Reed, Defense against primary user emulation attacks in cognitive radio networks, Selected Areas in Communications, vol. 1, pp , [25] Z. Jin, S. Anand, and K. P. Subbalakshmi, Detecting primary user emulation attacks in dynamic spectrum access networks, in Proc. IEEE International Conference on Communications, 2009, pp [26] Z. Yuan, D. Niyato, H. Li, et al., Defeating primary user emulation attacks using belief propagation in cognitive radio networks, Selected Areas in Communications, vol. 10, pp ,
7 [27] S. Chen, K. Zeng, and P. Mohapatra, Hearing is believing: Detecting mobile primary user emulation attack in white space, in Proc. INFOCOM, IEEE, 2011, pp [28] D. Hao and K. Sakurai, A differential game approach to mitigating primary user emulation attacks in cognitive radio networks, in Proc. 26th International Conference on Advanced Information Networking and Applications, IEEE, 2012, pp [29] D. Pu, Y. Shi, A. V. Ilyashenko, et al., Detecting primary user emulation attack in cognitive radio networks, in Proc. Global Telecommunications Conference, 2011, pp [30] C. Xin and M. Song, Detection of PUE attacks in cognitive radio networks based on signal activity pattern, Mobile Computing, vol. 5, pp , [31] O. León, J. Hernández-Serrano, and M. Soriano, Securing cognitive radio networks, International Journal of Communication Systems, vol. 5, pp , [32] Q. Pei, H. Li, J. Ma, et al., Defense against objective function attacks in cognitive radio networks, Chinese Journal of Electronics, vol. 1, pp , [33] W. Xu, T. Wood, and W. Trappe, et al., Channel surfng and spatial retreats: Defenses against wireless denial of service, in Proc. 3rd ACM Workshop on Wireless Security, Philadelphia, PA, January 2004, pp [34] A. Attar, H. Tang, A. V. Vasilakos, et al., A survey of security challenges in cognitive radio networks: Solutions and future research directions, Proceedings of the IEEE, vol. 100, no. 12, pp , [35] S. Liu, L. Lazos, and M. Krunz, Thwarting inside jamming attacks on wireless broadcast communications, in Proc. Fourth ACM Conference on Wireless Network Security. ACM, 2011, pp [36] W. Wang, S. Bhattacharjee, M. Chatterjee, et al., Collaborative jamming and collaborative defense in cognitive radio networks, Pervasive and Mobile Computing, vol. 4, pp , [37] M. Camilo, et al. Anti-jamming defense mechanism in cognitive radios networks, in Proc. Military Communications Conference, 2012, pp [38] R. Di Pietro and G. Oligeri, Jamming mitigation in cognitive radio networks, Network, IEEE, vol. 3, [39] L. Zhang, Q. Pei, and H. Li, Anti-jamming scheme based on zero pre-shared secret in cognitive radio network, in Proc. Eighth International Conference on Computational Intelligence and Security, IEEE, 2012, pp [40] L. Zhang, R. Zhang, Y. C. Liang, et al., On the relationship between the multi-antenna secrecy communications and cognitive radio communications, IEEE Trans on Communications, pp , Yi-Cheng Yu was born in Fujian, China in He received the B.S. degree from the Jilin University, Changchun in 2012, and he is currently working toward the M.S. degree at Jilin University. His main research interest includes computer networks and information security. Liang Hu had his BE ng on Computer Systems Organization in 1993 and his PhD on Computer Software and Theory in He is currently Professor and PhD supervisor of Jilin University, China. His main research interest includes network security and distributed computing. As a person in charge or a principal participant, Dr Liang Hu has finished more than 20 national, provincial and ministerial level research projects of China. Hong-tu Li was born in Siping of Jilin, China on Mar Now he is the teacher of the Jilin University, Changchun, China. He received the Ph.D. degree in computer structure from Jilin University in His current research interests focus on network security and cryptology. Yuan-mo Zhang was born in Jilin, China in She received the B.S. degree from the Jilin University, Changchun in 2012, and she is currently working toward the M.S. degree at Jilin University. Her research interest includes computer networks and information security. Fang-ming Wu received his B.S. degree from the PLA Information Engineering University in He is currently pursuing in the College of Computer Science and Technology, Jilin University. His research interest is the communication of WSN, computer networks and information security. Jian-feng Chu was born in 1978, Ph.D., Now he is the teacher of the College of Computer Science and Technology, Jilin University, Changchun, China. He received the Ph.D. degree in computer structure from Jilin University in His current research interests focus on information security and cryptology. 922
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
A survey on Spectrum Management in Cognitive Radio Networks
A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,
Enhancing Wireless Security with Physical Layer Network Cooperation
Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Chapter 15. Cognitive Radio Network Security
Chapter 15 Cognitive Radio Network Security 1 Outline A taxonomy of CR security threats Primary user emulation attacks Byzantine failures in distributed spectrum sensing Security vulnerabilities in IEEE
Voice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance
Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance Tamal Chakraborty 1, Atri Mukhopadhyay 2 1 Dept. of Electronics and Telecommunication Engineering 2 School of Mobile
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
Propsim enabled Mobile Ad-hoc Network Testing
www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile
Research on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM
AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM Mr.S.Iyyappan 1, Mr.V.Nandagopal 2 P.G Scholar, Dept. of EEE, Ganadipathy Tulis s Jain Engineering College, Vellore,
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),
Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network
Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD G.Pradeep Kumar 1, R.Chakkaravarthy 2, S.Arun kishorre 3, L.S.Sathiyamurthy 4 1- Assistant Professor,
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612
Spoofing Attack Detection and Localization of Multiple Adversaries in Wireless Networks S. Bhava Dharani, P. Kumar Department of Computer Science and Engineering, Nandha College of Technology, Erode, Tamilnadu,
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
A Survey:Render of PUE Attack in Cognitive Radio Compressed by Software Defined Radio
International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) - 2016 A Survey:Render of PUE Attack in Cognitive Radio Compressed by Software Defined Radio Mandakini Gupta Dept.
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
Defining the Smart Grid WAN
Defining the Smart Grid WAN WHITE PAPER Trilliant helps leading utilities and energy retailers achieve their smart grid visions through the Trilliant Communications Platform, the only communications platform
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring
Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring M.Shanthi 1, S.Suresh 2 Dept. of Computer Science and Engineering, Adhiyamaan college of Engineering, Hosur,
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE
ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE Hung-yu Wei, Samrat Ganguly, Rauf Izmailov NEC Labs America, Princeton, USA 08852, {hungyu,samrat,rauf}@nec-labs.com Abstract Non-uniform
Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Sajid Hussain* and Md Shafayat Rahman Jodrey School of Computer Science, Acadia University
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
Protocol Design for Neighbor Discovery in AD-HOC Network
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 915-922 International Research Publication House http://www.irphouse.com Protocol Design for
Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications
Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications The Master Degree in Electrical Engineering/Wireless Communications, is awarded by the Faculty of Graduate Studies
Metrics for Detection of DDoS Attacks
Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,
Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
A Novel Approach for Load Balancing In Heterogeneous Cellular Network
A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1
An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems
ICWMC 211 : The Seventh International Conference on Wireless and Mobile Communications An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2 1x EVDO and LTE Systems Xinsheng
Remote Home Security System Based on Wireless Sensor Network Using NS2
Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: [email protected] #D.Upender 2, Asst.Professor, E mail: [email protected] #Department
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology
Access Control And Intrusion Detection For Security In Wireless Sensor Network
Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.
Mobile and Sensor Systems
Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE
SWASTIK K. BRAHMA Electrical Engineering & Computer Science Syracuse University Syracuse, NY 13244 Tel: (505) 948-1288 Email: [email protected] Web: http://skbrahma.mysite.syr.edu/ PROFESSIONAL EXPERIENCE
Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas
I.J.Computer Network and Information Security, 21, 2, 26-32 Published Online December 21 in MECS (http://www.mecs-press.org/) Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Routing in Cognitive Radio Ad-Hoc Networks
Routing in Cognitive Radio Ad-Hoc Networks Payel Bandyopadhyay University of Helsinki Helsinki, Finland Email: [email protected] Abstract Cognitive Radio (CR) mitigates the problem of
- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study
in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study
216 Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study Dr Basil M Kasasbeh, Applied Science University,
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks
Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video
A Secure Key Management Scheme in Wireless Mesh Networks
A Secure Key Management Scheme in Wireless Mesh Networks Farah Kandah, Weiyi Zhang, Xiaojiang Du, Yashaswi Singh Department of Computer Science, North Dakota State University, Fargo, ND 585 Department
Current and Future Trends in Hybrid Cellular and Sensor Networks
2010-10-19 Current and Future Trends in Hybrid Cellular and Sensor Networks Yongjun Liu, Bin Zhen, Yong Xu, Hui Yang, Betty Zhao [email protected] www.huawei.com ETSI TC M2M Workshop 19-20 October
CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed
Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks
www.ijcsi.org 400 Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks K.Savitha 1, DR.C.Chandrasekar 2 1 Research Scholar, Periyar University Salem,
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
Cognitive Radio Network as Wireless Sensor Network (II): Security Consideration
Cognitive Radio Network as Wireless Sensor Network (II): Security Consideration Feng Lin, Zhen Hu, Shujie Hou, Jingzhi Yu, Changchun Zhang, Nan Guo, Michael Wicks, Robert C Qiu, Kenneth Currie Cognitive
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
A Routing Metric for Load-Balancing in Wireless Mesh Networks
A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca
MOBILE CONVERGED NETWORKS: FRAMEWORK, OPTIMIZATION, AND CHALLENGES
GE_LAYOUT_Layout 12/1/14 2:4 PM Page 2 MOBILE C O N V E RGED N E T W O RKS MOBILE CONVERGED NETWORKS: FRAMEWORK, OPTIMIZATION, AND CHALLENGES TAO HAN, YANG YANG, XIAOHU GE, AND GUOQIANG MAO Tao Han and
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu [email protected] Jen-Hou Liu [email protected] Min-Sheng
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Location management Need Frequency Location updating
Lecture-16 Mobility Management Location management Need Frequency Location updating Fig 3.10 Location management in cellular network Mobility Management Paging messages Different paging schemes Transmission
