716 Hits in 7.0 sec

Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

Linyuan Zhang, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han, Jinlong Wang
2015 IEEE Communications Surveys and Tutorials  
In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs.  ...  Second, we analyze the spear and shield relation between Byzantine attack and defense from three aspects: the vulnerability of CSS to attack, the obstacles in CSS to defense, and the games between attack  ...  ACKNOWLEDGEMENTS We thank the editor and anonymous reviewers for their precious time and efforts in reviewing this paper and providing us many helpful comments and constructive suggestions, which have  ... 
doi:10.1109/comst.2015.2422735 fatcat:dc3yq7dparbapht5nswwhhmzr4

Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey

Weidong Fang, Wuxiong Zhang, Wei Chen, Tao Pan, Yepeng Ni, Yinxuan Yang
2020 Wireless Communications and Mobile Computing  
As a key component of the information sensing and aggregating for big data, cloud computing, and Internet of Things (IoT), the information security in wireless sensor network (WSN) is critical.  ...  Hence, it is necessary to investigate and review the attack and defense with trust management. In this paper, the state-of-the-art trust management schemes are deeply investigated for WSN.  ...  The proposed system could defend against jamming attack at the physical layer, back-off manipulation attack at the MAC layer, and sinkhole attack at the network layer.  ... 
doi:10.1155/2020/2643546 fatcat:l4zu6xoo7bc5bptvbjsqagowze

Battery Draining Attack and Defense against Power Saving Wireless LAN Devices

Il-Gu Lee, Kyungmin Go, Jung Hoon Lee
2020 Sensors  
It has become a critical element in many areas of daily life and industry, including smart homes, smart factories, smart grids, and smart cities.  ...  This study analyzed the security vulnerabilities of the Wi-Fi power-saving mechanism used in smart devices and experimentally proved the feasibility of a battery draining attack (BDA) on commercial smartphones  ...  In the case of the IEEE 802.11a/b/g/n/ac wireless local area network (WLAN) in the 2.4/5 GHz frequency band, channel bandwidth has been increased and transmission speeds have been improved by the introduction  ... 
doi:10.3390/s20072043 pmid:32260577 pmcid:PMC7180966 fatcat:kcsbh5zy4zd23entye5z47pq5e

Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin [article]

Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He
2022 arXiv   pre-print
Specifically, the paper i) introduces the background of the smart grid; ii) reviews external cyber attacks from attack incidents and attack methods; iii) introduces critical defense approaches in industrial  ...  of DT, including its basic concepts, applications in the smart grid, and how DT enhances the security.  ...  ACKNOWLEDGMENT We appreciate the support of the National Key R&D Program of China under Grants No. 2020YFB1807500, No. 2020YFB1807504, and National Science Foundation of China Key Project under Grants  ... 
arXiv:2205.11783v1 fatcat:fz43u2e6g5gyfepqz44tezelba

Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks [chapter]

Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim
2014 Lecture Notes in Computer Science  
Wireless local area networks (WLANs) can adopt channel hopping technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals.  ...  Then, we propose a new jamming attack called "persistent jamming", which is a modified reactive jamming that is effective in dense networks.  ...  Introduction Wireless local area network (WLAN) technologies are an essential feature of everyday life because they are used in home networking, smart mobile devices, network infrastructure, and much more  ... 
doi:10.1007/978-3-319-11379-1_18 fatcat:zsrecs2jffc25pmkhbvkh2wfvm

Analyzing wireless communication network vulnerability with homological invariants [article]

Michael Robinson
2013 arXiv   pre-print
This article explains how sheaves and homology theory can be applied to simplicial complex models of wireless communication networks to study their vulnerability to jamming.  ...  It develops two classes of invariants (one local and one global) for studying which nodes and links present more of a liability to the network's performance when under attack.  ...  However, the problems of designing attack and defense strategies for jamming have been neglected areas of study [4] .  ... 
arXiv:1311.1532v1 fatcat:ihu5js73jng33mtj36y43idzua

The Insecurity of Wireless Networks

Frederick T. Sheldon, John Mark Weber, Seong-Moo Yoo, W. David Pan
2012 IEEE Security and Privacy  
Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2.  ...  These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics.  ...  For example, many utilities routinely permit the operation of cell phones, pagers, wireless bar code readers, and wireless-local-area-network connections in or near their control centers or substations  ... 
doi:10.1109/msp.2012.60 fatcat:nhceyc2rcndf5mrs3xsfge3sfa


2019 IET Communications  
Directional antennas in wireless sensor networks (WSNs) have several advantages including the enhanced capacity of the network, longer range of transmission, better spatial reuse and lower interference  ...  When compared with methods, in which the directional antennas provide advantages like the extended range of transmission, energy savings, better prevention of wormhole attack, long coverage and high interference  ...  They also studied the effect of jamming attacks by utilising the directional antennas in the wireless network for dealing with the jamming attack.  ... 
doi:10.1049/iet-com.2019.0859 fatcat:jdb7ar3ztraalb2romo3fea4pu

Enhancing the security of LTE networks against jamming attacks

Roger Piqueras Jover, Joshua Lackey, Arvind Raghavan
2014 EURASIP Journal on Information Security  
Nevertheless, as all wireless systems, LTE is vulnerable to radio jamming attacks.  ...  This proof of concept paper overviews a series of new effective attacks (smart jamming) that extend the range and effectiveness of basic radio jamming.  ...  This attack is broadly known as a simple and common way to attack a wireless network and has been widely studied in the literature in the context of wireless local area networks (WLAN) [4] , sensor networks  ... 
doi:10.1186/1687-417x-2014-7 fatcat:s2tcq7ynhfg7jodn34svu3enca

Cyber Security Challenges in Future Military Battlefield Information Networks

Dulik, Dulik (jr.)
2019 Advances in Military Technology  
The authors focus on the threat of the communication medium which is mainly used in military battlefield information networks -the wireless channel, which is the basis of different mobile wireless systems  ...  A unifying extended layered model is presented in the article, which in addition to ISO/OSI model spreads cyber threat to geographic and social spheres.  ...  The concerns of wireless security, in terms of threats and countermeasures, are similar to those found in a wired environment, such as an Ethernet Local Area Network (LAN) or a wired wide-area network.  ... 
doi:10.3849/aimt.01248 fatcat:wmhodojkcrcmpfrfndcn7wbwbu

Security: A Core Issue in Mobile Ad hoc Networks

Asif Shabbir, Fayyaz Khalid, Syed Muqsit Shaheed, Jalil Abbas, M. Zia-Ul-Haq
2015 Journal of Computer and Communications  
In this paper, we shall discuss in detail, what does security mean, why MANETs are more susceptible to security attacks than wired networks, taxonomy of network attacks and layer wise analysis of network  ...  Wireless networks are considered more exposed to security attacks as compared to wired networks, especially; MANETs are the soft target due to vulnerable in nature.  ...  Acknowledgements I, personally feel extremely beholden to Prof(R) Ghulam Qasim Shah who with self-abnegation graciously spared his time and reviewed this paper.  ... 
doi:10.4236/jcc.2015.312005 fatcat:oaovaaafp5bnfihxgxlcww6os4

Jamming Detection Mechanisms for Wireless Sensor Networks

Murat Çakiroglu, Ahmet Turan Özcerit
2008 Proceedings of the Third International ICST Conference on Scalable Information Systems  
The Jamming-style Denial of Service (J-DoS) attacks are significant causes of malfunctioning of Wireless Sensor Networks (WSNs).  ...  The attackers mainly operate in the wireless communication medium by following a couple of diverse scenarios.  ...  Since it attacks persistently, the deceptive jammer is not energy efficient as well. Random Jammer The random jammer attacks the network at random time slots, and sleeps in the rest of periods.  ... 
doi:10.4108/icst.infoscale2008.3484 dblp:conf/infoscale/CakirogluO08 fatcat:7jnok4gc65dnfdcgbnfm5eauym

Analysis of Security Attacks and Taxonomy in Underwater Wireless Sensor Networks

Irfan Ahmad, Taj Rahman, Asim Zeb, Inayat Khan, Inam Ullah, Habib Hamam, Omar Cheikhrouhou, Hamada Esmaiel
2021 Wireless Communications and Mobile Computing  
Many review articles are addressed some of the security attacks and taxonomy of the Underwater Wireless Sensor Networks.  ...  Underwater Wireless Sensor Networks (UWSN) have gained more attention from researchers in recent years due to their advancement in marine monitoring, deployment of various applications, and ocean surveillance  ...  Disaster Prevention and Defense Application.  ... 
doi:10.1155/2021/1444024 fatcat:io4naxc7aneglnu42ylll22qyq

Security Challenges, Threat and Solutions for 5G Network for IoT

Muhammad Tahir Zaman, Maryam Rani, Sidra Maqbool
2022 Zenodo  
Concerns about 5G network security will be addressed in this study. 5G will provide pervasive network service, improved customer mobility, and low-cost device connection (e.g., IoT).  ...  We also discuss current and future 5G safety alternatives.  ...  Latest 5G wireless methods, on the one side, introduce certain current and persistent bodily level risks to 5G IoT apps.  ... 
doi:10.5281/zenodo.5814135 fatcat:6qpfhl2sj5dzpmt2o3cddfry7m

Determining the position of a jammer using a virtual-force iterative approach

Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu
2010 Wireless networks  
Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications.  ...  In this paper, we investigate issues associated with localizing jammers in wireless networks.  ...  Acknowledgments Preliminary results of this paper have been presented in part in IEEE SPEUCS 2007 [35] and IEEE PWN 2009 [36] .  ... 
doi:10.1007/s11276-010-0295-6 fatcat:rfjriklpsvdfbdnszsfmqs3jfq
« Previous Showing results 1 — 15 out of 716 results