76 Hits in 8.3 sec

Practical data hiding technique in Covert timing channels

M. Gokul Narayanan, PS. Lokesh, N. Kanimozhi
2018 International Journal of Trend in Scientific Research and Development  
In this paper, we propose a novel covert channel technique using the packet reordering phenomenon as a host for carrying secret communications.  ...  The reliability a capacity of this technique have shown promising results. We also investigated a practical mechanism for distorting and potentially preventing similar novel channels.  ...  In this paper, we propose a novel covert channel technique using the packet reordering phenomenon as a host for carrying secret communications.  ... 
doi:10.31142/ijtsrd10777 fatcat:ccxepqlz65gstifn3wsot2qqxq

A Hybrid Cryptographic System for Secured Device to Device Communication

A. Rama Krishna, A. S. N. Chakravarthy, A. S. C. S. Sastry
2016 International Journal of Electrical and Computer Engineering (IJECE)  
D2D is the evolving communication technology which focuses on short distance hops between the public devices to reach the destination.  ...  The major drawback of this technology is that most of the devices are public hence trustworthiness of the entire channel needs to be addressed in order to make it a viable solution.  ...  This technique uses the frequency of occurrence as reference to design a variable-length key based lookup-table for coding that original information.  ... 
doi:10.11591/ijece.v6i6.11264 fatcat:efux5i4w7ngvffq6qgwt3c76de

Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices

Marco Cominelli, Francesco Gringoli, Paul Patras, Margus Lind, Guevara Noubir
2020 2020 IEEE Symposium on Security and Privacy (SP)  
channel for less than a millisecond), and that a BT Device Address (BDADDR) is not sent in the clear but obfuscated through whitening mechanisms that depend on the clock of the master.  ...  GFSK is a digital frequency modulation technique whereby symbols are first filtered by a Gaussian filter and then used to modulate the carrier signal.  ...  All devices listen periodically (every 1.28 s) for inquiries on a single frequency chosen from the set of 32 wake-up carriers, for a total duration of 11.25 ms.  ... 
doi:10.1109/sp40000.2020.00091 dblp:conf/sp/CominelliGPLN20 fatcat:o45pbv4yubcxjlalo6ik3togr4

WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips

Romain Cayre, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Mohamed Kaaniche, Geraldine Marconato
2021 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)  
The attack takes advantage of the compatibility that exists between the two modulation techniques used by these two protocols.  ...  We present the key principles of the attack and describe some real-world experiments that allowed us to demonstrate its practical feasibility.  ...  As an example, the selection of a Zigbee channel by BlueBee is based on the channel hopping algorithm of BLE connected mode, so it requires to establish a BLE connection with another BLE device.  ... 
doi:10.1109/dsn48987.2021.00049 fatcat:dsvqbzq6gndhhiqtbfj7ezgryi

LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review

Henri Ruotsalainen, Guanxiong Shen, Junqing Zhang, Radek Fujdiak
2022 Sensors  
Afterwards, we discuss the impact of the reviewed topics on LoRaWAN security and, subsequently, we identify research gaps as well as promising future research directions.  ...  As LoRaWAN is one of the most popular long-range wireless protocols among low-power IoT applications, more and more focus is shifting towards security.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s22093127 pmid:35590817 pmcid:PMC9100101 fatcat:jzbtt3a5ifd75dqeilyaonjvli

Denial of Service Attacks in Wireless Networks: The Case of Jammers

Konstantinos Pelechrinis, Marios Iliofotou, Srikanth V. Krishnamurthy
2011 IEEE Communications Surveys and Tutorials  
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack.  ...  Jamming techniques vary from simple ones based on the continual transmission of interference signals, to more sophisticated attacks that aim at exploiting vulnerabilities of the particular protocol used  ...  For example, frequency hopping techniques assume that rapid hopping between channels is possible. However this might depend on the hardware used.  ... 
doi:10.1109/surv.2011.041110.00022 fatcat:3shw3wsgf5hzthokvk3cwjusfu

Epidemic contact tracing with smartphone sensors [article]

Khuong An Nguyen, Zhiyuan Luo, Chris Watkins
2020 arXiv   pre-print
To the best of our knowledge, this paper was one of the first work to propose a combination of smartphone sensors for contact tracing.  ...  Contact tracing is widely considered as an effective procedure in the fight against epidemic diseases.  ...  Acknowledgements The authors are grateful to the three reviewers for their insightful comments that greatly improve this work. This research is partially supported by AstraZeneca.  ... 
arXiv:2006.00046v2 fatcat:hxqqhxgwn5eifedfvwaeupqdha

Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges

Maurantonio Caprolu, Savio Sciancalepore, Roberto Di Pietro
2020 IEEE Communications Surveys and Tutorials  
Short-range audio channels have a few distinguishing characteristics: ease of use, low deployment costs, and easy to tune frequencies, to cite a few.  ...  To provide a rigorous, scientific, security-oriented review of the field, in this paper we survey and classify methods, applications, and use-cases rooted on short-range audio channels for the provisioning  ...  ACKNOWLEDGEMENTS The authors would like to thank the anonymous reviewers for their comments and suggestions, that helped improving the quality of the manuscript.  ... 
doi:10.1109/comst.2020.2969030 fatcat:26sskdeh3faaxmyu32iidlxbp4

Performance analysis of ultra wide band indoor channel

Kazi Afrina Yasmeen, A. K. M. Wahiduzzaman, Ahamed Imtiaz, M. A. Matin
2008 2008 Mosharaka International Conference on Communications, Propagation and Electronics  
We feel deepest admiration to our Department for giving us the honor to perform the thesis as a partial fulfillment of the requirement for the degree of Bachelor of Science (BS) in Electronics and Communication  ...  Our special thanks go to all the faculty members of BRAC University, specially from the Computer Science and Engineering (CSE) Department for their important suggestions and useful resources.  ...  To measure the sampled frequency response of the channel an S-parameter test is used and Time domain (pulse) sounding technique In this technique a narrow pulse is employed to probe the channel.  ... 
doi:10.1109/miccpe.2008.4555754 fatcat:tvu4o5kjsbhplog4k5of2fzshe

Wireless sensor networks: a survey

I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci
2002 Computer Networks  
First, the sensing tasks and the potential sensor networks applications are explored, and a review of factors influencing the design of sensor networks is provided.  ...  This paper describes the concept of sensor networks which has been made viable by the convergence of microelectro-mechanical systems technology, wireless communications and digital electronics.  ...  Solar cells is an example for the techniques used for energy scavenging.  ... 
doi:10.1016/s1389-1286(01)00302-4 fatcat:2546baz7ynglnormnpm7emwaga

Distributed resource allocation in cognitive and cooperative ad hoc networks through joint routing, relay selection and spectrum allocation

Lei Ding, Tommaso Melodia, Stella N. Batalama, John D. Matyjas
2015 Computer Networks  
We then propose and design a practical medium access control protocol in which the probability of accessing the channel for a given node depends on a local utility function determined as the solution of  ...  of the wireless channel.  ...  The sender informs the receiver and relay of the selected frequency interval using an RTS packet.  ... 
doi:10.1016/j.comnet.2015.02.027 fatcat:h3wkzip3prgolda5i56cyd3bbu

Recent Advances in LoRa: A Comprehensive Survey

Zehua Sun, Huanqi Yang, Kai Liu, Zhimeng Yin, Zhenjiang Li, Weitao Xu
2022 ACM transactions on sensor networks  
The vast demand for diverse applications raises new networking challenges, which have encouraged the development of a new paradigm of Internet of Things (IoT), e.g., LoRa.  ...  LoRa is a proprietary spread spectrum modulation technique, which provides a solution for long-range and ultra-low power-consumption transmission.  ...  [69] revealed the existence of a covert channel using a modulation scheme orthogonal to CSS over LoRa PHY layer, which is transparent and covert to current security mechanisms.  ... 
doi:10.1145/3543856 fatcat:n454idfkmnfk5fzgaau2goy3hm

Interference Management in 5G and Beyond Network: Requirements, Challenges and Future Directions

Maraj Uddin Ahmed Siddiqui, Faizan Qamar, Faisal Ahmed, Quang Ngoc Nguyen, Rosilah Hassan
2021 IEEE Access  
Furthermore, as an in-depth literature review, we discuss various types of interferences related to each method by studying the state-of-the-art relevant research in the literature.  ...  We also state methodologies proposed by the 3 rd Generation Partnership Project (3GPP) and present the promising and feasible research directions toward this challenging topic for the realization of 5G  ...  As a result, investigators said that it is viable to operate an outband D2D configured system for short-range communication using either Wi-Fi Direct or Bluetooth i.e., unlicensed spectrum.  ... 
doi:10.1109/access.2021.3073543 fatcat:pszxfc6abbg6lkdf2yegsiobfy

A survey on wireless multimedia sensor networks

Ian F. Akyildiz, Tommaso Melodia, Kaushik R. Chowdhury
2007 Computer Networks  
Architectures for WMSNs are explored, along with their advantages and drawbacks. Currently off-the-shelf hardware as well as available research prototypes for WMSNs are listed and classified.  ...  The availability of low-cost hardware such as CMOS cameras and microphones has fostered the development of Wireless Multimedia Sensor Networks (WMSNs), i.e., networks of wirelessly interconnected devices  ...  Acknowledgement The authors would like to thank Vehbi C. Gungor, Dario Pompili, and Mehmet C. Vuran for their valuable comments.  ... 
doi:10.1016/j.comnet.2006.10.002 fatcat:7szaxvgwhzeitfcfc3nnzqyk4i

Ultra-wideband communications - An idea whose time has come

Liuqing Yang, G.B. Giannakis
2004 IEEE Signal Processing Magazine  
It overviews the state-of-the-art in channel modeling, transmitters, and receivers of UWB radios, and outlines research directions and challenges to be overcome.  ...  As signal processing expertise is expected to have major impact in research and development of UWB systems, emphasis is placed on DSP aspects.  ...  He was editor-in-chief for IEEE Signal Processing Letters, associate editor for IEEE Transactions on Signal Processing, and served many  ... 
doi:10.1109/msp.2004.1359140 fatcat:wpf7n3shlbb27kyld2xxtkvzuu
« Previous Showing results 1 — 15 out of 76 results