Security of Wireless Communication

@inproceedings{Cvrcek2008SecurityOW,
  title={Security of Wireless Communication},
  author={Daniel Cvrcek},
  booktitle={FIDIS},
  year={2008}
}
What are the real security issues of wireless communication and wireless sensor networks in particular? Despite predictions of wireless sensor networks being deployed in many aspects of everyday life, real world deployments are still quite sparse. It seems that monitoring of large civil engineering structures is one of the few applications where wireless sensor networks may give enough value for the necessary investment. The least, several companies managing large civil structures in the UK are… 

User Identity Protection in Wireless Local Area Networks

TLDR
This paper has designed and implemented a new and efficient wireless authentication protocol providing user identity secrecy that takes advantage of PEAP’s management easiness and the robustness of dynamic key distribution to provide user identity protection.

Security Enhancement of Wireless Sensor Networks Using Signal Intervals

TLDR
This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval and the pairing process can be protected from MITM attacks and be convenient for users.

Design and implementation analysis of a public key infrastructure‐enabled security framework for ZigBee sensor networks

TLDR
The approach adopted in this paper is to alter the communication flow so as to necessitate minimum memory and computational requirements at the resource starved end points.

An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments

TLDR
This paper proposed a scheme not only holding all the merits of previous works, but also achieving unlinkability which is guaranteed by using one-time-use temporary ID, which the mobile user can also updates its one- time- use temporary ID with the help of the visited foreign agent.

A practical authentication protocol with anonymity for wireless access networks

TLDR
A new practical authentication scheme is proposed not only reserving the merits of Yang et al.'s scheme, but also extending some additional merits including: no verification table in the home network, free of time synchronization between mobile stations and visited networks, and without obsolete anonymous tickets left in visited networks.

A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

TLDR
This article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.

Secure and Authentication Communication in GSM , GPRS , and UMTS Using Asymmetric Cryptography

TLDR
A new generalized approach based on asymmetric cryptography for user/network authentication and communication encryption in GSM/GPRS and UMTS with reduced signaling overhead is proposed in this paper.

Fast Handoff in Secure IEEE 802.11s Mesh Networks

TLDR
Performance results show that this approach reduces handoff delay by up to 268% or achieves comparable performance resulting from the counterpart IEEE 802.11i scheme with high likelihood of 70%-85% successful preauthentication.

IJCSI Publicity Board 2010

TLDR
This paper presents a systematic analysis of a variety of different ad hoc network topologies in terms of node placement, node mobility and routing protocols through several simulated scenarios.

Secure and efficient cache-based authentication scheme for vehicular ad-hoc networks

TLDR
The proposed protocol requires relatively less authentication delay as compare to the traditional authentication schemes without affecting desired security and design properties and may be considered for low-power practical applications of VANET due to its enhanced security and reduced computation and communication overheads.

References

SHOWING 1-10 OF 14 REFERENCES

TinySec: a link layer security architecture for wireless sensor networks

TLDR
TinySec is introduced, the first fully-implemented link layer security architecture for wireless sensor networks, and results on a 36 node distributed sensor network application clearly demonstrate that software based link layer protocols are feasible and efficient, adding less than 10% energy, latency, and bandwidth overhead.

Random key-assignment for secure Wireless Sensor Networks

TLDR
A probabilistic model and two protocols to establish a secure pair-wise communication channel between any pair of sensors in the WSN, by assigning a small set of random keys to each sensor, are described.

Practical attacks on proximity identification systems

  • G. Hancke
  • Computer Science
    2006 IEEE Symposium on Security and Privacy (S&P'06)
  • 2006
TLDR
Focusing mainly on the RF communication interface, the results and implementation of eavesdropping, unauthorized scanning and relay attacks against 'proximity' (ISO 14443 A) type RFID tokens are discussed.

A key-management scheme for distributed sensor networks

TLDR
A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.

Using encryption for authentication in large networks of computers

Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of

Random key predistribution schemes for sensor networks

TLDR
The random-pairwise keys scheme is presented, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation.

Attacks on time-of-flight distance bounding channels

TLDR
It is concluded that conventional RF channels can be problematic for secure distance- bounding implementations and the merits and weaknesses of special distance-bounding channels that have been proposed for RFID applications are discussed.

DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks

  • A. WoodJ. StankovicGang Zhou
  • Computer Science
    2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
  • 2007
TLDR
To the best of the knowledge, this work is the first to confront multiple types of jamming on common WSN hardware with solutions that are shown empirically to enable continued communication despite an ongoing attack.

Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication

TLDR
A very practical ciphertext-only cryptanalysis of GSM encrypted communication, and various active attacks on the GSM protocols, which allow attackers to tap conversations and decrypt them either in real-time, or at any later time.

Real Time Cryptanalysis of A5/1 on a PC

TLDR
New attacks on A5/1 are described, which are based on subtle flaws in the tap structure of the registers, their noninvertible clocking mechanism, and their frequent resets, which make it vulnerable to hardware-based attacks by large organizations, but not to software- based attacks on multiple targets by hackers.