Wireless security Research Papers - Academia.edu (original) (raw)

The increasing pace in the wireless communication taking momentum in the market of commercial application where a significant trade-off between user-experience and security demands exists. The Near Field Communication or NFC is one such... more

The increasing pace in the wireless communication taking momentum in the market of commercial application where a significant trade-off between user-experience and security demands exists. The Near Field Communication or NFC is one such communication trend which is effectively adopted by the user worldwide to make touchless operation using their mobile device. Although, it is claimed that NFC incorporates some of the standard encryption but existing researchers fails to prove that their electromagnetic signals are snot so difficult to compromise to result in collateral damage to user's resources. Thus, there exist research work towards strengthing security system, but there is yet to report on any standard security protocol or framework to ensure the highest resiliency. This paper provides a comprehensive visualization towards the effectiveness of existing research approaches to formulate the research trend and gap.

Rapidly growing 802.11 wireless local area networks continue to gain popularity in business and computer industry. This growing popularity and usage also caused many improvements on both physical layer and security mechanisms. In this... more

Rapidly growing 802.11 wireless local area networks continue to gain popularity in business and computer industry. This growing popularity and usage also caused many improvements on both physical layer and security mechanisms. In this study we investigated the performance of wireless local area networks (WLANs) and security mechanisms available for WLANs. These security mechanisms are wired equivalent privacy (WEP), Wi-Fi

Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that... more

Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user’s usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in some conferences [1][2][3][4], we explained the structure of WEP, WPA and WPA2 as first, second and third Wi-Fi security protocols and discussed all their versions, vulnerabilities and lacks and improvements. Now, in this paper we try to peruse the weaknesses of WPA2 as the last security protocol in Wi-Fi category and then try to make a whole picture of Wi...

Modern surveillance devices are increasingly being taken off private networks and placed onto networks connected via gateway to the Internet or into Wi-Fi based local area wireless networks (LAWN). The devices are also increasingly using... more

Modern surveillance devices are increasingly being taken off private networks and placed onto networks connected via gateway to the Internet or into Wi-Fi based local area wireless networks (LAWN). The devices are also increasingly using IPv4 and IPv6 network stacks and some form of embedded processing or compute built in. Additionally, some specialist devices are using assistive technologies such as GPS or A-GPS. This paper explored the issues with use of the technologies in a networked environment, both wireless and internetworked. Analysis of these systems shows that the use of IP based CCTV systems carries greater risk than traditional CCTV systems, primarily due to the exposure to IP based vulnerabilities. Furthermore, Wi-Fi based IP CCTV systems are additionally susceptible to remote, physical denial of service attacks due to the broadcast nature of wireless communication systems. Interception of traffic is possible with IP based systems, and again, Wi-Fi IP based CCTV systems...

Communication is the basic need and back-bone for development of any society. Societal development and advancement in the electronics & technology led to the development of Wireless based Systems & has become vital for the modern... more

Communication is the basic need and back-bone for development of any society. Societal development and advancement in the electronics & technology led to the development of Wireless based Systems & has become vital for the modern existence. Wireless Local Area Network (WLAN) is the best example for the same. Popularity of the Wireless Local Area Networks (WLANs) are in increasing trend as they are fast, flexible, cost effective, and easy to use. Application & uses of the WLAN has led some security challenges also & choice of security protocol is one of the typical tasks. In general, any information system incorporating wireless technology should fulfil some basic security objectives. The typical taxonomy of security properties can be described by confidentiality, integrity, and availability (CIA).In wireless communication, data rate is increasing drastically due to advancement in technology at a massive scale. In this paper, we review and summarize IEEE 802.11 protocol architecture, component of WLAN, and security issues in WLAN etc.

How to reflash older Ubiquity hardware with latest firmware, this removes the ubnt virus and restores the radio to factory default settings.

Wireless Networking technology is now one of the most popular technologies but still there are drawbacks which are closely associated with Wireless Networks. In wireless network communication, the data is transferred from one point to... more

Wireless Networking technology is now one of the most popular technologies but still there are drawbacks which are closely associated with Wireless Networks. In wireless network communication, the data is transferred from one point to another point through radio waves which makes wireless networks weak for attacks. To eliminate threats, understanding about said attacks always provides good ability to defend wireless network. This research paper will describe the overview of the wireless technology with its drawbacks, Present security and privacy issues, Potential wireless network Security threats (unauthorized access, Active eavesdropping, Man in the Middle Attack, Denial of
Service and etc), Tools that hackers often use to exploit vulnerabilities in wireless networking (NetStumbler, Kismet, Airsnort, Airsnarf, Airjack and etc) and will propose the best ways to secure Wireless Network.

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its... more

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

—Communication security is an essential and progressively difficult issue in wireless networks. Physical-layer approach to secret key generation which is each quick and independent of channel variations is taken into account. This... more

—Communication security is an essential and progressively difficult issue in wireless networks. Physical-layer approach to secret key generation which is each quick and independent of channel variations is taken into account. This approach makes a receiver jam the signal during a manner that also permits it to decrypt the info, nevertheless prevents alternative nodes from cryptography. Another well-known approach for achieving information-theoretic secrecy depends on deploying artificial noises to blind the intruders' interception within the physical layer. A multiple inter-symbol obfuscation (MIO) theme is planned, that utilizes a collection of artificial vociferous symbols to alter the initial knowledge symbols within the physical layer. MIO will effectively enhance the wireless communications security.

The goal of this work is to point out some important facts in the establishment of wireless connection, where network infrastructure is less complex than wired media. Security needs to be enabled on wireless devices during their... more

The goal of this work is to point out some important facts in the establishment of wireless connection, where network infrastructure is less complex than wired media. Security needs to be enabled on wireless devices during their installation in enterprise environments. In wireless security, encryption is used to secure the network.
In this work the author will discuss:
• Existing mode of wireless LAN products
• Existing solution to security using identifiers &
authentication
• Encryption methods for secure connection
• Possibility of secure media access

In this paper, we proposed a novel efficient method of analyzing the ergodic channel capacity of the cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a very tight approximate moment generating function... more

In this paper, we proposed a novel efficient method of analyzing the ergodic channel capacity of the cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a very tight approximate moment generating function (MGF) of end-to-end signalto-noise ratio of 2-hop multi-relay system, which is In this paper, we proposed a novel efficient method of analyzing the ergodic channel capacity of the cooperative amplify-andforward (CAF) relay system. This is accomplished by employing a very tight approximate moment applicable to myriad of fading environments including mixed and composite fading channels. Three distinct adaptive source transmission policies were considered in our analysis namely: (i) constant power with optimal rate adaptation (ORA); (ii) optimal joint power and rate adaptation (OPRA); and (iii) fixed rate with truncated channel inversion (TCIFR). The proposed frame work based on the novel approximate MGF method is sufficiently general to encapsulate all types of fading environments (especially for the analysis of the mixed fading case)and provides significant advantage to model wireless system for mixed and composite fading channel. In addition to simplifying computation complexity of ergodic capacity for CAF relaying schemes treated in literature, we also derive closed form expressions for the above three adaptive source transmission policies under Nakagami-m fading with i.n.d statistics. The accuracy of our proposed method has been validated with existing MGF expressions that are readily available for specific fading environments in terms of bounds, and via Monte Carlo simulations.

This paper concerns the eavesdropping attacks in wireless ad hoc networks under a shadow fading environment. Most of previous studies have only concentrated on protecting the confidential communications at both the transmitters and the... more

This paper concerns the eavesdropping attacks in wireless
ad hoc networks under a shadow fading environment. Most of previous
studies have only concentrated on protecting the confidential communications
at both the transmitters and the receivers and little attention
has been paid on investigating the eavesdropping behaviors done by the
malicious nodes. We therefore investigate the eavesdropping success rate
of eavesdroppers equipped with various antenna models under various
channels conditions, such as the path loss effect and the shadow fading
effect. In particular, we formulate the eavesdropping attack problem with
consideration of both simplistic directional antenna models and realistic
antenna models. We then conduct extensive simulations to evaluate the
eavesdropping success rate with different eavesdroppers. Our simulation
results show that the eavesdropping success rate heavily depends on both
the antenna models and the channel conditions.

Wireless Mobile ad-hoc network (MANETs) is an emerging technology which is infrastructure less without any centralized controller and also each node contains routing capability.Security is an essential service for wired and wireless... more

Wireless Mobile ad-hoc network (MANETs) is an emerging technology which is infrastructure less without any centralized controller and also each node contains routing capability.Security is an essential service for wired and wireless network communications. Due to lack of central monitoring system, security becomes major challenge. The characteristics of MANETs pose both challenges and opportunities in achieving security goals, such as confidentiality, authentication, integrity, availability,access control and non-repudiation. This paper contains a survey of attacks and countermeasures in Mobile ad hoc network.The countermeasures are features or functions that reduce security vulnerabilities and attacks. First, we give an overview of attacks and then we present preventive approaches for those attacks. We also put forward an overview of MANET intrusion detection systems (IDS).

As wireless network usage thrivingly grows, MAC address spoofing recently poses a serious security threat to a public wireless network. In the past, several schemes have been proposed to leverage this problem. However, these previous... more

As wireless network usage thrivingly grows, MAC address spoofing recently poses a serious security threat to a public wireless network. In the past, several schemes have been proposed to leverage this problem. However, these previous methods incur high deployment costs in employing countermeasure protocols. In this paper, we present a lightweight agent-based access control framework to counter MAC address spoofing

This paper concerns the eavesdropping attacks from the eavesdroppers’ perspective, which is new since most of current studies consider the problemfromthe goodnodes’ perspective.Inthis paper, we originally propose an analytical framework... more

This paper concerns the eavesdropping attacks from the eavesdroppers’ perspective, which is new since
most of current studies consider the problemfromthe goodnodes’ perspective.Inthis paper, we originally
propose an analytical framework to quantify the effective area and the probability of the eavesdropping
attacks. This framework enables us to theoretically evaluate the impact of node density, antenna model,
and wireless channel model on the eavesdropping attacks. We verify via extensive simulations that the
proposed analytical framework is very accurate. Our results show that the probability of eavesdropping
attacks significantly vary, depending on the wireless environments (such as shadow fading effect, node
density, and antenna types). This study lays the foundation toward preventing the eavesdropping attacks
in more effective and more economical ways.

Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as well. Today, new technologies that allow mobile (cellular)... more

Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as well. Today, new technologies that allow mobile (cellular) phones and other handheld devices to access the Internet have made wireless business transactions possible. This phenomenon is known as mobile commerce or M-Commerce. It has been predicted that the number of mobile phones connected to the mobile Internet will exceed the number of Internet-connected PCs before 2007. The mobile phone will therefore become the most prevalent device for accessing the Internet. Several industry analysts predict that Mcommerce will constitute a multibillion dollar business by 2005. However, M-Commerce brings new challenges in providing information security as information travels through multiple networks often across wireless links. What must be done to secure financial transactions via mobile commerce? Generally speaking, M...

Modern surveillance devices are increasingly being taken off private networks and placed onto networks connected via gateway to the Internet or into Wi-Fi based local area wireless networks (LAWN). The devices are also increasingly using... more

Modern surveillance devices are increasingly being taken off private networks and placed onto networks connected via gateway to the Internet or into Wi-Fi based local area wireless networks (LAWN). The devices are also increasingly using IPv4 and IPv6 network stacks and some form of embedded processing or compute built in. Additionally, some specialist devices are using assistive technologies such as GPS or A-GPS. This paper explored the issues with use of the technologies in a networked environment, both wireless and internetworked. Analysis of these systems shows that the use of IP based CCTV systems carries greater risk than traditional CCTV systems, primarily due to the exposure to IP based vulnerabilities. Furthermore, Wi-Fi based IP CCTV systems are additionally susceptible to remote, physical denial of service attacks due to the broadcast nature of wireless communication systems. Interception of traffic is possible with IP based systems, and again, Wi-Fi IP based CCTV systems are more susceptible due to protocol vulnerabilities and lack of processing power. The paper concludes that more research is needed in this area to identify and classify generic vulnerabilities that these systems are vulnerable to, and to present a framework which can be used to mitigate the risk of adopting these systems.

- Encryption algorithms play a main role in wireless network security systems. However, those algorithms consume a significant amount of computing resources such as CPU time, and packet size. In an attempt to remedy the wireless network... more

- Encryption algorithms play a main role in wireless network security systems. However, those algorithms consume a significant amount of computing resources such as CPU time, and packet size. In an attempt to remedy the wireless network security issue, a novel ...

"In the digital world, which is currently evolving and changing at such a rapid pace, the security of digital information has become increasingly more important. Great development of secret contact and communication in the world, the... more

"In the digital world, which is currently evolving and changing at such a rapid pace, the security of digital
information has become increasingly more important. Great development of secret contact and communication in
the world, the necessity of communication security is becoming more and more significant. Cryptography has
specific role to protect secret files like secret documents from unauthorized access. Cryptography algorithms are
classified in to two types, Public-key producing and symmetric-key producing algorithms. In this paper, I suggested
a new robust cryptography algorithm to increase security in the Symmetric-key producing algorithm. The main
features of cryptography algorithm defined in this article are the ability to encrypt the secret file in successive stages,
changing the physical structure of the secret file, no limitation for the number of keys, Creating five keys at each
stage of cryptography, storing a part of secret file at one of the keys at each stage of cryptography, Interdependence
of all keys in all stages of encrypting and decrypting, To make the keys interdependent and to encrypt the secret file
by each of them, there are 2 independent algorithms to select the type of algorithm needed to make the keys
interdependent by the user, bigger changes in the physical structure of the encrypted file In case of wrong decryption
and to make the resulting keys and encrypted file unique after the cryptography process."

We propose a novel approach to detect reactive jammers in direct sequence spread spectrum (DSSS) wireless networks. The key idea is to use the chip error rate of the first few jamming-free symbols at the DSSS demodulator during the signal... more

We propose a novel approach to detect reactive jammers in direct sequence spread spectrum (DSSS) wireless networks. The key idea is to use the chip error rate of the first few jamming-free symbols at the DSSS demodulator during the signal synchronization phase of regular packet reception to estimate the probability of successful packet delivery. If the estimated probability is significantly higher than the actual packet delivery ratio, we declare jamming. As a proof of concept, we implement a prototype in a network of three USRP software-defined radios (transmitter, receiver, and jammer) and evaluate the feasibility, responsiveness, and accuracy of our approach in a controlled lab environment. Our experiments with IEEE 802.15.4 DSSS-based communication show that for links with a jamming-free packet delivery probability above 0.5, the false positive and negative detection rates remain below 5%.

ABSTRACT Wireless Local Area Networks (WLANs) are gaining popularity as they are fast, cost effective, flexible and easy to use. They are, however, faced with some serious security challenges and the choice of security protocol is a... more

ABSTRACT Wireless Local Area Networks (WLANs) are gaining popularity as they are fast, cost effective, flexible and easy to use. They are, however, faced with some serious security challenges and the choice of security protocol is a critical issue for IT administrators.

Wireless Local Area Networks (WLAN) provide connectivity along with flexibility at low cost. Appreciating the exponential growth in this area, Institute of Electrical and Electronics Engineers (IEEE) ratified IEEE standard 802.11 in 1999... more

Wireless Local Area Networks (WLAN) provide connectivity along with flexibility at low cost. Appreciating the exponential growth in this area, Institute of Electrical and Electronics Engineers (IEEE) ratified IEEE standard 802.11 in 1999 which was widely accepted as the defacto industry standard for interconnection of portable devices. Due to the scarcity of battery power in portable devices operating in WLANs, 802.11 directly addresses the issue of Power Saving (PS) and defines a whole mechanism to allow stations (STA) to go into sleep mode without losing information, as access point (AP) keeps buffering the messages directed to the sleeping STA. Growing use of 802.11 lead to the identification of flaws in security specifications of the standard known as Wired Equivalent Privacy (WEP). These flaws were addressed by the introduction of amendments/enhancements. However, IEEE's security enhancements failed to achieve the desired objectives especially availability, which is the mai...

Wireless Local Area Networks (WLAN) provide connectivity along with flexibility at low cost. Appreciating the exponential growth in this area, the Institute of Electrical and Electronics Engineers (IEEE) ratified IEEE standard 802.11 in... more

Wireless Local Area Networks (WLAN) provide connectivity along with flexibility at low cost. Appreciating the exponential growth in this area, the Institute of Electrical and Electronics Engineers (IEEE) ratified IEEE standard 802.11 in 1999 which was widely accepted as the defacto industry standard for interconnection of portable devices. Due to the scarcity of battery power in portable devices operating in WLANs, IEEE 802.11 directly addressed the issue of Power Saving (PS) and defined a whole mechanism to allow stations (STA) to go into sleep mode without losing information, as Access Point (AP) keeps buffering the messages directed to the sleeping STA. Growing use of IEEE 802.11 lead to the identification of flaws in security specifications of the standard known as Wired Equivalent Privacy (WEP). These flaws were addressed by the introduction of amendments/enhancements. However, IEEE's security enhancements failed to achieve desired objectives especially availability, which ...

Abstract. Cellular Message Encryption Algorithm (CMEA) has been widely used for wireless security and the breaking of the scheme proves the requirement of alternatives. In the current paper the properties of the CMEA, which has lead to... more

Abstract. Cellular Message Encryption Algorithm (CMEA) has been widely used for wireless security and the breaking of the scheme proves the requirement of alternatives. In the current paper the properties of the CMEA, which has lead to the successful cryptanalysis, has ...