Science topic

Wireless Security - Science topic

Wireless Security are wireless networks, security protocols, privacy, sensor network security
Questions related to Wireless Security
  • asked a question related to Wireless Security
Question
4 answers
Dear Mr. Puys,
My name is Rocio Lopez Perez, I am master student of the University of Luxembourg and I am currently doing my thesis in the topic "Anomaly Detection System for SCADA".
I saw your project in Research Gate related to Attacks Scenarios Against Industrial Systems.
Actually, my work is focused on finding malicious data in Modbus/TCP packets that can cause a failure in a Power Plant (SCADA system).
From my understanding, Master and Slaves devices in SCADA systems communicate through Modbus/TCP protocol, 
e.g. Master sends to Slave: Query -> Write single Coil(5)
                  Slave to Master: Response -> Write single Coil(5)
Since I would like to use this dataset to train Machine Learning algorithms, I should need a big amount of data composed of benign and malicious Modbus/TCP packets (pcap files for example).
Do you happen to know where I could find benign and malicious Modbus protocol data? Do you have any advise for my Master Thesis?
Thank you very much in advance,
Best regards,
 Rocio
Relevant answer
Answer
network's Security, HEC Approved PhD Supervisor WIPO-Korea Summer School on Intellectual Property 2020
  • asked a question related to Wireless Security
Question
3 answers
how can i measure the "average received CNR(carrier-to-noise ratio)" which is given by Mohamed-Slim Alouini and Andren Goldsmith in "capacity of nakagami multipath fading channels". We all know that we can measure the recieved CNR by transmitted CNR- channel loss. Can i calculate the average received CNR in the same way average received CNR= average transmitted CNR-loss? I mean do the average CNR for transmitter and the receiver have the relation that can be used in the received CNR and transmitted CNR? ill appreciate it for ur answers
Relevant answer
Answer
C/N = 20 log 10 [Vc/ Vn]
  • asked a question related to Wireless Security
Question
5 answers
Given that:
1) Alice and Bob have access to a common source of randomness,
2) Bobs random values are displaced by some (nonlinear) function, i.e. B_rand = F(A_rand).
Are there protocols, which allow for the two to securely agree on the function (or its inverse) without
revealing any information about it?
Relevant answer
Answer
Basically, there are three main steps for secure key generation based physical layer properties . These are 1) randomness extraction 2) reconciliation 3) privacy amplification .
We usually refer to key agreement by the reconciliation where some correction techniques can be used such as LDPC , cascaded , .... .
Due to the leak of the information in the reconciliation step , the privcy amplification can be utilized by the mean of some functions like universal hashing function
  • asked a question related to Wireless Security
Question
1 answer
The current trends in Wireless Security are driven by cost-effective technique, known as wireless energy-harvesting (WEH) in which energyconstrained devices harvest energy from ambient radio frequency (RF) signal to power their batteries, for saving energy and powering wireless devices. The WEH technique is based on the fact that RF signal can carry both information and energy. Since energy receivers (ER) are located near the wireless transmitter for harvesting much energy, the WEH network is vulnerable to eavesdropping attack.
Papers:
Tuan, V. P., & Kong, H. Y. (2018). Secure communication via an energy-harvesting untrusted relay with imperfect CSI. Annals of Telecom.
X. Zhou, R. Zhang, and C. K. Ho, "Wireless information and power transfer: Architecture design and rateenergy tradeoff," IEEE Trans. Commun., vol. 61, no. 11, pp. 4754-4767, 2013.
A. Nasir, X. Zhou, S. Durrani, and R. Kennedy, "Relaying protocols for wireless energy harvesting and information processing," IEEE Trans. Wireless Commun., vol. 12, no. 7, pp. 3622-3636, 2013.
Xing, H., Liu, L., & Zhang, R. (2016). Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel. IEEE Trans. Veh. Technol., 65(1), 180-190.
Tuan, V. P., & Kong, H. Y. (2018). Secure communication in untrusted relay selection networks with wireless energy harvesting. Wireless Networks.
Relevant answer
Answer
  • asked a question related to Wireless Security
Question
4 answers
What's the most importants simulations(statistics) in Ad Hoc networks?
I work on OLSR(Basic, Attacked and Secured) routing protocol.
Relevant answer
Answer
Thank you Sara.
I will simulate the OLSR in 3 scenarios: Basic, Attacked and Secured.
I want to know the most important statistics that i should collect to test my solution.
Regards.
  • asked a question related to Wireless Security
Question
7 answers
Research topic to explore to write thesis for mscs
About wireless sensor network
Relevant answer
Answer
Key management
  • asked a question related to Wireless Security
Question
4 answers
Bottleneck( Congested) Link behaves same at same link strength in both wired and wireless networks?
Relevant answer
Answer
Wireless mostly offers slower speeds than wired links.
  • asked a question related to Wireless Security
Question
5 answers
Keeping nodes receiver ON all the time would consume battery in no time. Since nodes are battery operated i want an efficient scheme in which master controls a node with minimal power usage. 
Relevant answer
Answer
wirelessHart 
  • asked a question related to Wireless Security
Question
4 answers
Acually i am looking for a method/technique that can be for charging a battery in WBAN
Relevant answer
Answer
I hope this would be helpful to you
Nguyen, Thien D., Jamil Y. Khan, and Duy T. Ngo. "Energy harvested IEEE 802.15. 4 wireless body area network." Proceedings of the 10th EAI International Conference on Body Area Networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2015.
  • asked a question related to Wireless Security
Question
2 answers
Can somebody detail some problems associated with security in ad hoc networks?
Relevant answer
Answer
Hi
as you know because of these challenges :
( dynamic topologies , absence of infrastructure , limited bandwidth ,need to cooperate , auto-configuration ,etc) that make ad hoc network more vulnerable as one of the branches wireless Networks measuring with wired networks so we can not restriction issues so these are most issues :
security issues in ad hoc (vehicular ad hoc networks , mobile ad hoc networks) are routing protocols at network layer and also spanning across all layers of communication stack issues and there are many security issues which have been studied in recent years. for instance:spoofing attacks , wormhole attacks , black hole attacks , denial of service (DoS) attacks ,distributed DoS (DDoS) , etc..
regards...
  • asked a question related to Wireless Security
Question
1 answer
I'm trying to run a modified routing protocol on a TelosB mote and I need to see each and every update of routing table and information about route selection.  The designer of the actual protocol have given lots of Debug in the nesc code  but I don't know how to see them When I'm running the protocol on  a TelosB mote
Relevant answer
Answer
I think before burning it, you should try it using Cooja or Tossim.
  • asked a question related to Wireless Security
Question
1 answer
I m using Energia for getting data from remote location through Wireless protocol at regular interval. In order to have RTC work without library, I need to disable WDT of MSP430 G2553
Can any one suggest me the ways to disable WDT in energia
Relevant answer
  • asked a question related to Wireless Security
Question
17 answers
I would like to start a simulation between two nodes using different types of encryption, and I am confused between Omnet++, Castalia and NS3. I don't know which one of them support encryption and other security features required by WSNs. Could you please share your experience in this mattaer.
Many thanx.
Relevant answer
Answer
Thanks Guys your answers is really appreciated. I am still would like to hear from someone who already has used either omnet++ or NS2 for WSN encryption.
  • asked a question related to Wireless Security
Question
3 answers
In wireless mesh networks, how do I decide the packet transmission with improved throughput under power constraint?
Relevant answer
Answer
you can use fazzy logic or automata  for select best decide  for your network ;
for example fuzzy help you consider several parameters and select best decide base this parameters 
or you can use automata for determinat state probability for next dicide 
best regard ..
  • asked a question related to Wireless Security
Question
3 answers
I want to modify AODV protocol to protect from routing table over flow attack?
Can any one help me to accomplish that?
  • asked a question related to Wireless Security
Question
3 answers
Please Provide me Information related to this. And give me useful link.
Relevant answer
Answer
  • asked a question related to Wireless Security
Question
1 answer
.
Relevant answer
Answer
WMAN enables the users to create wireless connections between multiple locations within a metropolitan area. It connects the multiple office buildings in a city or on a university campus. WMAN does not require high cost of placing fiber or copper cabling and leasing lines. Further, WMAN can work as backups for wired networks.
WMAN uses either infrared light or radio waves to transfer data. WMAN is supported with three different standards.
• 802.16
• HiperMAN
• HiperACCESS
In addition, Back haul and last mile are two fundamental types of WMAN.
The advantage of MWAN for implementing metropolitan area network is its beauty due to less cost than fiber-based Local area networks (LANs) due to several reasons. It is easy to use, extend, exchange or back up prevailing fiber infrastructure within hours, preserving time and money on personnel. It also eradicates leased line costs, fiber trenching cost in laying fiber. Another noteworthy benefit of implementing the WMAN is to bridge the “digital divide” by affording linking communities that have not had the access to wireless internet connections and LAN. Implementing of WMAN allows companies, government agencies, etc. to swiftly increase their internet service into new marketplaces for generating better revenues. From other side, WMAN has security issue because it consists of large area and having problem being hacked the information. A WMAN is merely a bigger WAN track, and thus provides the larger chance for a hacker.
  • asked a question related to Wireless Security
Question
4 answers
Are there efficient protocols to perform secure data aggregation in wireless sensor networks?
Relevant answer
Answer
Data aggregation in WSN refers to send data from the sensor nodes to the gateway node. There are several aggregation approaches used followed in Wireless Sensor Network, Such as
• Tree based Aggregation
• In network aggregation
Data aggregation in WSN consists of two major security challenges: confidentiality and integrity of data. In addition, traditional method of encryption is also used to offer end to end confidentiality in WSNs. The aggregators in a secure data aggregation scenario require to decrypt the encrypted data to accomplish aggregation.
I will recommend the following healthy contributions to understand the topic in more detail.
1). S.Roy, M.Conti, S. Setia, S.Jajodia, “Secure Data Aggregation in Wireless Sensor Networks”, IEEE Transactions on Information Forensics and Security, Vol.7, no.3, July 2012, pp. 1040 – 1052.
2). Suat Ozdemir, Yang Xiao, “Secure data aggregation in wireless sensor networks: A comprehensive over view”, International Journal of Elsevier on Computer Networks, vol. 53, 2009, pp. 2022–2037.
3). A Spatio-Temporal Data Aggregation Scheme for Wireless Sensor Networks, European Journal of Scientific Research ISSN 1450-216X Vol.74 No.4 (2012), pp. 516-526.
  • asked a question related to Wireless Security
Question
2 answers
For example, by using this ABC Algorithm to reduce packet loss between Mobile Sink and Sensor Node.
Relevant answer
Answer
Thank You!!!
  • asked a question related to Wireless Security
Question
2 answers
How do we improve security in MANET?
Relevant answer
Answer
We did some work on this topic. Please have a look at
Nicolai Kuntze, Andreas Fuchs, and Carsten Rudolph. Reliable Identities using off-the-shelf hardware security in MANETs. In Proceedings of the International Symposium on Trusted Computing and Communications (TrustCom 2009), 2009.
  • asked a question related to Wireless Security
Question
11 answers
Our college has both Opnet and NS2, but I am not acquainted with either of them.
Relevant answer
Answer
NS2 is better for wireless network protocols such as LEACH protocol
  • asked a question related to Wireless Security
Question
1 answer
What algorithm shall we use, or is there any available set of rules to detect blackhole attack?
Relevant answer
Answer
Black holes are places in the network where incoming or outgoing traffic is silently discarded without informing the source that data did not reach its intended recipient.
Such attacks can only be detected by monitoring the lost traffic
Some Solution/rules to detect blackhole attack
1. Black hole filtering: dropping packets at the routing level, usually using a routing protocol to implement the filtering on several routers at once, often dynamically to respond quickly to distributed denial-of-service attacks.
2. A DNS-based Blackhole List (DNSBL) or Real-time Blackhole List (RBL) is a list of IP addresses published through the Internet Domain Name System (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists. The term "Blackhole List" is sometimes interchanged with the term "blacklist" and "blocklist".
  • asked a question related to Wireless Security
Question
13 answers
In IP-based WSN networks (like 6LoWPAN), what are end-to-end security methods used to secure communication between nodes and IP machines?
Relevant answer
Layer 2 security offers only a hop by hop protection, which means that at each point between the source and the destination data are decrypted and then reencrypted. An end to end protection is provided by protocols at higher levels such as IPSEC at the network layer and DTLS at the transport layer.
  • asked a question related to Wireless Security
Question
1 answer
If it is detected that sensor nodes are attacked by worms, what counter-measures are needed?
Relevant answer
Answer
What's the relation between sleep time and worm attack? As WSN is a LAN with its entry point at the sink, so unless the sink is infected, how come a node can be infected?
  • asked a question related to Wireless Security
Question
1 answer
Hi, Working on Wireless Sensor Networ, Energy effitiency in WSN, Knoledge Representation, AR, MANET and Routing Protocols and algorithams Desigh as well.
Relevant answer
Answer
hi venkates me also working in the same area could u plz tell the simulation tool u r using for the simulation of sensor network