Wireless Security - Science topic
Wireless Security are wireless networks, security protocols, privacy, sensor network security
Questions related to Wireless Security
Dear Mr. Puys,
My name is Rocio Lopez Perez, I am master student of the University of Luxembourg and I am currently doing my thesis in the topic "Anomaly Detection System for SCADA".
I saw your project in Research Gate related to Attacks Scenarios Against Industrial Systems.
Actually, my work is focused on finding malicious data in Modbus/TCP packets that can cause a failure in a Power Plant (SCADA system).
From my understanding, Master and Slaves devices in SCADA systems communicate through Modbus/TCP protocol,
e.g. Master sends to Slave: Query -> Write single Coil(5)
Slave to Master: Response -> Write single Coil(5)
Since I would like to use this dataset to train Machine Learning algorithms, I should need a big amount of data composed of benign and malicious Modbus/TCP packets (pcap files for example).
Do you happen to know where I could find benign and malicious Modbus protocol data? Do you have any advise for my Master Thesis?
Thank you very much in advance,
how can i measure the "average received CNR(carrier-to-noise ratio)" which is given by Mohamed-Slim Alouini and Andren Goldsmith in "capacity of nakagami multipath fading channels". We all know that we can measure the recieved CNR by transmitted CNR- channel loss. Can i calculate the average received CNR in the same way average received CNR= average transmitted CNR-loss? I mean do the average CNR for transmitter and the receiver have the relation that can be used in the received CNR and transmitted CNR? ill appreciate it for ur answers
1) Alice and Bob have access to a common source of randomness,
2) Bobs random values are displaced by some (nonlinear) function, i.e. B_rand = F(A_rand).
Are there protocols, which allow for the two to securely agree on the function (or its inverse) without
revealing any information about it?
The current trends in Wireless Security are driven by cost-effective technique, known as wireless energy-harvesting (WEH) in which energyconstrained devices harvest energy from ambient radio frequency (RF) signal to power their batteries, for saving energy and powering wireless devices. The WEH technique is based on the fact that RF signal can carry both information and energy. Since energy receivers (ER) are located near the wireless transmitter for harvesting much energy, the WEH network is vulnerable to eavesdropping attack.
Tuan, V. P., & Kong, H. Y. (2018). Secure communication via an energy-harvesting untrusted relay with imperfect CSI. Annals of Telecom.
X. Zhou, R. Zhang, and C. K. Ho, "Wireless information and power transfer: Architecture design and rateenergy tradeoff," IEEE Trans. Commun., vol. 61, no. 11, pp. 4754-4767, 2013.
A. Nasir, X. Zhou, S. Durrani, and R. Kennedy, "Relaying protocols for wireless energy harvesting and information processing," IEEE Trans. Wireless Commun., vol. 12, no. 7, pp. 3622-3636, 2013.
Xing, H., Liu, L., & Zhang, R. (2016). Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel. IEEE Trans. Veh. Technol., 65(1), 180-190.
Tuan, V. P., & Kong, H. Y. (2018). Secure communication in untrusted relay selection networks with wireless energy harvesting. Wireless Networks.
End Nodes in a WSN in security setting is to be created.
Mountainous area is involved in this scenario.
What's the most importants simulations(statistics) in Ad Hoc networks?
I work on OLSR(Basic, Attacked and Secured) routing protocol.
Research topic to explore to write thesis for mscs
About wireless sensor network
Bottleneck( Congested) Link behaves same at same link strength in both wired and wireless networks?
Keeping nodes receiver ON all the time would consume battery in no time. Since nodes are battery operated i want an efficient scheme in which master controls a node with minimal power usage.
Acually i am looking for a method/technique that can be for charging a battery in WBAN
Can somebody detail some problems associated with security in ad hoc networks?
I'm trying to run a modified routing protocol on a TelosB mote and I need to see each and every update of routing table and information about route selection. The designer of the actual protocol have given lots of Debug in the nesc code but I don't know how to see them When I'm running the protocol on a TelosB mote
I m using Energia for getting data from remote location through Wireless protocol at regular interval. In order to have RTC work without library, I need to disable WDT of MSP430 G2553
Can any one suggest me the ways to disable WDT in energia
I would like to start a simulation between two nodes using different types of encryption, and I am confused between Omnet++, Castalia and NS3. I don't know which one of them support encryption and other security features required by WSNs. Could you please share your experience in this mattaer.
In wireless mesh networks, how do I decide the packet transmission with improved throughput under power constraint?
I want to modify AODV protocol to protect from routing table over flow attack?
Can any one help me to accomplish that?
Please Provide me Information related to this. And give me useful link.
Are there efficient protocols to perform secure data aggregation in wireless sensor networks?
For example, by using this ABC Algorithm to reduce packet loss between Mobile Sink and Sensor Node.
Our college has both Opnet and NS2, but I am not acquainted with either of them.
What algorithm shall we use, or is there any available set of rules to detect blackhole attack?
In IP-based WSN networks (like 6LoWPAN), what are end-to-end security methods used to secure communication between nodes and IP machines?
If it is detected that sensor nodes are attacked by worms, what counter-measures are needed?
Hi, Working on Wireless Sensor Networ, Energy effitiency in WSN, Knoledge Representation, AR, MANET and Routing Protocols and algorithams Desigh as well.