Filters








6,960 Hits in 6.6 sec

The communication and computation cost of wireless security

Dave Singelee, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede
2011 Proceedings of the fourth ACM conference on Wireless network security - WiSec '11  
In this presentation we will focus on the energy cost. Energy for wireless security has two main components: communication cost and computation cost.  ...  COST OF CRYPTOGRAPHY ON EMBED-DED PLATFORMS As mentioned above obtaining security and privacy for pervasive applications is a challenging problem, mainly due to the low power/energy budgets.  ... 
doi:10.1145/1998412.1998414 dblp:conf/wisec/SingeleeSBV11 fatcat:wg2mnnekdvcczodvtvy3di6fnm

Security of Wireless Communication [chapter]

Dan Cvrček
2009 IFIP Advances in Information and Communication Technology  
What are the real security issues of wireless communication and wireless sensor networks in particular?  ...  It seems that monitoring of large civil engineering structures is one of the few applications where wireless sensor networks may give enough value for the necessary investment.  ...  (see Fig. 7 for simplified attacking code we used with an extended version of Scapy tool).  ... 
doi:10.1007/978-3-642-03315-5_9 fatcat:26fntrqq5bfqjjugauogi4rf3q

Max-min Fair Wireless Energy Transfer for Secure Multiuser Communication Systems [article]

Derrick Wing Kwan Ng, Robert Schober
2014 arXiv   pre-print
The proposed problem formulation exploits the dual use of artificial noise generation for facilitating efficient wireless energy transfer and secure communication.  ...  receivers and a constraint on the maximum tolerable channel capacity achieved by the energy harvesting receivers for a given transmit power budget.  ...  INTRODUCTION Ubiquitous, secure, and high data rate communication is a basic requirement for the next generation wireless communication systems.  ... 
arXiv:1404.1820v1 fatcat:ow4xgkro7jaixb7oxqi47pzdhq

Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

Jong-Ho Lee, Illsoo Sohn, Yong-Hwa Kim
2017 Sensors  
In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers.  ...  Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s17051128 pmid:28509841 pmcid:PMC5470804 fatcat:jv3wlvf7uzfr7liluladqvkeje

Energy Harvesting in Secure MIMO Systems [article]

Wei Wu, Xueqi Zhang, Baoyun Wang
2016 arXiv   pre-print
(potential eavesdropper) while guaranteeing the secure communication for the multi- antenna information receiver (IR).  ...  The problems of energy harvesting in wireless com- munication systems have recently drawn much attention.  ...  target secrecy capacity for IR and P > 0 specifies the total power budget 1 .  ... 
arXiv:1601.03468v1 fatcat:txwzdvvtl5bshosse2xnubmrf4

Waveform Design for Secure SISO Transmissions and Multicasting [article]

Ming Li, Sandipan Kundu, Dimitris A. Pados, Stella N. Batalama
2013 arXiv   pre-print
Wireless physical-layer security is an emerging field of research aiming at preventing eavesdropping in an open wireless medium.  ...  Next, if prior knowledge of the eavesdropper's CSI is unavailable, we design a waveform that maximizes the amount of energy available for generating disturbance to eavesdroppers, termed artificial noise  ...  As a result, there has been growing interest recently in the development of physical layer security mechanisms for the wireless link.  ... 
arXiv:1306.0549v1 fatcat:lprmynie4zf7fkikltj3fflnii

A system architecture, processor, and communication protocol for secure implants

Christos Strydis, Robert M. Seepers, Pedro Peris-Lopez, Dimitrios Siskos, Ioannis Sourdis
2013 ACM Transactions on Architecture and Code Optimization (TACO)  
Wireless communication goes through a custom security ASIP, called SISC (Smart-Implant Security Core), which runs an energy-efficient security protocol.  ...  This work describes an original, efficient solution for secure IMD communication.  ...  Broustis (security), Ir. D. Riemens (synthesis), and A. L. Mansano (RF energy harvesting).  ... 
doi:10.1145/2555289.2555313 fatcat:cpztrnw5tzd6lkzmblyyyhlq4u

A system architecture, processor, and communication protocol for secure implants

Christos Strydis, Robert M. Seepers, Pedro Peris-Lopez, Dimitrios Siskos, Ioannis Sourdis
2013 ACM Transactions on Architecture and Code Optimization (TACO)  
Wireless communication goes through a custom security ASIP, called SISC (Smart-Implant Security Core), which runs an energy-efficient security protocol.  ...  This work describes an original, efficient solution for secure IMD communication.  ...  Broustis (security), Ir. D. Riemens (synthesis), and A. L. Mansano (RF energy harvesting).  ... 
doi:10.1145/2541228.2555313 fatcat:hp3pt4imfrfwjgdtfyntquoiiy

Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges [article]

Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro
2020 arXiv   pre-print
In this paper, we survey the security issues, applications, techniques, and challenges arising in wireless networks powered via EH technologies.  ...  The recent advancements in hardware miniaturization capabilities have boosted the diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power embedded wireless devices in a sustainable  ...  ACKNOWLEDGEMENTS The authors would like to thank the anonymous reviewers for their comments and suggestions, that helped improving the quality of the manuscript.  ... 
arXiv:2004.10394v2 fatcat:o4iwqkcdvfgmtjmwmxgvrbt3je

Optimal Power Allocation for Achieving Secure Green Cognitive Radio Networks

Ramnaresh Yadav, Keshav Singh, Ashwani Kumar
2022 Electronics  
Since physical-layer security is an emerging technique that improves the security of communication devices, in this paper, an ergodic secure energy efficiency problem for a cognitive radio network is formulated  ...  Accordingly, by considering the great ecological and economic benefits of green wireless networks, this work focus on energy-efficient resource allocation in secure cognitive radio networks.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics11131952 fatcat:pyolpdg7srb7ba7falrkcgmr2u

ntelligent Wireless Sensor Network System to shrink Suspected Terror from Militants

Sanjeev Puri
2012 International Journal of Computer Network and Information Security  
Energy aware routing is immensely helpful to sensor networks in the aspect of extending the life span of the WSNs.  ...  In this paper, an automatic suspected terror system based on wireless sensor networks is developed, which is designed for high-rise metro structure.  ...  energy budget for all other services.  ... 
doi:10.5815/ijcnis.2012.03.07 fatcat:zecmvxu43zhdbnicddz4rgzxwq

Security of Wireless Embedded Devices in the Real World [chapter]

Timo Kasper, David Oswald, Christof Paar
2012 ISSE 2011 Securing Electronic Business Processes  
At hand of the real-world examples, the implications of a key extraction for the security of the respective contactless application are illustrated.  ...  In the past years, wireless embedded devices have become omnipresent.  ...  Conclusion A cost-effective toolset that is optimized for physical and protocol attacks on the security of wireless devices was presented, which can be extended to analyze virtually any type of cryptographic  ... 
doi:10.1007/978-3-8348-8652-1_16 fatcat:btgggkxq6jexph7c6zpwlglf3e

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose.  ...  Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  The hardware architecture for a mote, which requires very low die size, is totally different from a PDA-like node which has a limited energy budget available.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Beamforming for Secure Wireless Information and Power Transfer in Terrestrial Networks Coexisting With Satellite Networks

Zhi Lin, Min Lin, Jian Ouyang, Wei-Ping Zhu, Symeon Chatzinotas
2018 IEEE Signal Processing Letters  
minimal achievable secrecy rate of the IRs subject to the constraints of energy harvest requirement, interference threshold, and transmit power budget.  ...  By assuming that the energy receivers are the potential eavesdroppers overhearing signals intended for information receivers (IRs), we first formulate a constrained optimization problem to maximize the  ...  Fig. 3 depicts the minimal ASR versus the transmit power budget of the BS for different BF schemes.  ... 
doi:10.1109/lsp.2018.2842645 fatcat:wm2pkwjbezfj7bjkk7kp5cpc6m

Secure routing in wireless sensor networks: attacks and countermeasures

Chris Karlof, David Wagner
2003 Ad hoc networks  
We propose security goals for routing in sensor networks, present general classes of attacks, and analyze the security of nearly all the currently documented sensor network routing protocols and energy  ...  We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal.  ...  First, we propose threat models and security goals for secure routing in wireless sensor networks.  ... 
doi:10.1016/s1570-8705(03)00008-8 fatcat:d224khzm2zbmnbvpqgzwm2ker4
« Previous Showing results 1 — 15 out of 6,960 results