Know Your Neighbor, Keep Your Distance and other cautionary tales for wireless systems

Size: px
Start display at page:

Download "Know Your Neighbor, Keep Your Distance and other cautionary tales for wireless systems"

Transcription

1 Know Your Neighbor, Keep Your Distance and other cautionary tales for wireless systems Panos Papadimitratos Joint work with M. Poturalski, M. Fleury, J.-P. Hubaux, and J.-Y. Le oudec Wireless Systems Wireless local area networks (WLNs) Link to the Internet Wireless ccess Point 5 6 1

2 Wireless Systems (cont d) WLNs, Personal rea (PNs), d hoc Networks Wireless Systems (cont d) Radio Frequency Identification (RFID) Tagged object Reading signal ID Detailed object information Wi-Fi and luetooth enabled devices ID ack-end database L.. Illustration: Ericsson, ca Wireless Systems (cont d) Sensor networks Wireless Systems (cont d) Tactical ad hoc networks Military Search-and-rescue Node photos: Xow 9 1 Wireless Systems (cont d) Vehicular ad hoc networks (VNETs) Wireless Systems (cont d) set of basic elements Radio link establishment Direct wireless communication Multi-hop communication Distance to other reachable devices Device localization and own positioning pplication performance measurable in the physical world Illustration: C2C-CC

3 Wireless Systems Security set of basic elements KYN, KYD, and other cautionary tales for wireless systems nti-jamming techniques Secure Neighbor Discovery Secure data communication Secure ranging Distance bounding Secure localization and positioning Know Your Neighbor Vehicular Communications transportation safety KYN, KYD, and other cautionary tales for wireless systems Neighbor Discovery (ND) Secure Neighbor Discovery C Neighbor Discovery (ND) node discovers other nodes it can directly communicate with D Neighbor Discovery (ND) (cont d) Neighbor Discovery (ND) (cont d) Hello, I m R is neighbor of if and only if it can receive directly from Link (,) is up is neighbor of R R, i.e., (,) may be up while (,) is down 17 R Simple, widely used solution, but not secure Easy to attack Mislead that is its neighbor, when this is not the case 18 : is my neighbor ; is added in my Neighbor List 3

4 ttacking ND Securing ND M Hello, I m Hello, I m C Hello, I m Z Single adversary appears as multiple neighbors 19 : Neighbor List = {, C,, Z} (1) n, (2), n, n,, Sig (, n,n, ), Cert C (K,) n attempt Message authenticity and replay protection n, n are nonces ob essentially challenges lice to provide a hello message 2 ttacking ND (cont d) Relay or Wormhole ttack Simply relay any message, without any modification ttacking ND (cont d) Long-range relay / wormhole The attacker relays messages across large distances : Neighbor List = {} Hello, I m Hello, I m M 1 M out-of-band or 2 private channel Hello, I m : Neighbor List = {} M ttacking ND: Implications Routing in multihop ad hoc networks ttacking ND: Implications (cont d) Routing in multihop ad hoc networks

5 ttacking ND: Implications (cont d) Routing in multihop ad hoc networks ttacking ND: Implications (cont d) RFID-based access control 25 ttacker close to the access-granting RFID tag Relays signals from and to her accomplice, who obtains access Z. Kfir and. Wool, Picking virtual pockets using relay attacks on contactless smartcard, SECURECOMM 5 26 Securing Two-Party ND asic ideas uthentication Node-to-node distance estimation P x>r : P not neighbor Y<R : P neighbor x 27 y R Securing Two-Party ND (cont d) Use message time-of-flight to measure distance Distance ounding [1] Temporal Packet Leashes [2] SECTOR [3] Use node location to measure distance Geographical Packet Leashes [2] [1] S. rands and D. Chaum, Distance-bounding protocols, EUROCRYPT 93 [2] Y.-C. Hu,. Perrig, and D.. Johnson. Packet leashes: defense against wormhole attacks in wireless networks, IEEE INFOCOM 3 [3] S. Capkun, L. uttyan, and J.-P. Hubaux, SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, CM SSN 3 28 Securing Two-Party ND (cont d) re these protocols [1,2,3] achieving secure ND? Can any protocol, including and similar to [1,2,3], which can measure time, solve the secure ND problem? Is there any provably secure ND protocol? Note: Measurements can be *very* accurate None of the above protocols secures ND No (secure) ND protocol that relies on time measurements does 29 Traces and Events Trace is a set of events C 3 5

6 Feasible Traces Setting S System execution: feasible trace Traces feasible with respect to: Θ S Θ S,P Θ S,P, Θ - Setting S - Protocol P - dversary E {,, C, D, E, D F, G, H } F H G Trace θ Feasible wrt Setting S Causal and timely message exchange Trace θ Feasible wrt Setting S (cont d) Causal and timely message exchange v signal propagation speed Local Trace Protocol P Local view Protocol ctions

7 Trace θ Feasible wrt Protocol Correct nodes follow the protocol Trace θ Feasible wrt dversary dversarial nodes can only relay messages with minimum delay Denote the adversary as: Neighbor Discovery Specification Neighbor Discovery Specification (cont d) Protocol P solves Neighbor Discovery for adversary if 1) Discovered neighbors are actual neighbors 2) It is possible to discover neighbors Protocol P solves Two-Party Neighbor Discovery for adversary if 1) Discovered neighbors are actual neighbors 2) It is possible to discover neighbors in the ND range R 39 4 T-protocol Impossibility Theorem:No T-protocol can solve Neighbor Discovery for adversary if. Proof (sketch): ny T-protocol P that satisfies ND2 cannot satisfy ND1 Observation: Physical proximity does not necessarily imply correct nodes are able to Results T-protocol ND impossibility (general case) T-protocol solving ND (restricted case) TL-protocol solving ND (general case) M. Poturalski, P. P., and J-P. Hubaux, Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility, CM SICCS 28 M. Poturalski, P. P., and J-P. Hubaux, Secure Neighbor Discovery: Is it Possible? LC-REPORT-27-4, 27 communicate directly

8 Protocol P CR/TL Challenge-Response/Time-and-Location ND Properties Revisited (cont d) Correctness: challenge message response message vailability: authenticator message T P protocol specific duration Protocol P CR/TL (cont d) Theorem: Protocol P CR/TL satisfies the Neighbor Discovery Specification: Correctness (ND1) vailability (ND2 CR/TL ) Under the assumptions: i. ny processing delay relay > ii. Equality of maximum information propagation speed and wireless channel propagation speed v adv = v Summary Secure Neighbor Discovery Prerequisite for: Networking protocols Various applications System security Hard problem Proven secure solutions Implementation not easy in practice M. Poturalski, P. P., and J.-P. Hubaux, Towards provable secure neighbor discovery in wireless networks, CM CCS FMSE dditional Readings Overview P. P., M. Poturalski, P. Schaller, P. Lafourcade, D. asin, S. Capkun, and J-P. Hubaux, "Secure Neighborhood Discovery: Fundamental Element for Mobile d Hoc Networking," IEEE Communications Magazine, February 28 Implementation R. Shokri, M. Poturalski, G. Ravot, P. P., and J.-P. Hubaux, Low- Cost Secure Neighbor Verification Protocol for Wireless Sensor Networks, CM WiSec, March 29 lternative: Detect relays (aka wormholes) E.g., statistically and centrally Chapter 6 of Security and Cooperation in Wireless Networks, by L. uttyan and J.-P. Hubaux, Cambridge Press, 27 KYN, KYD, and other cautionary tales for wireless systems Keep Your Distance

9 KYN, KYD, and other cautionary tales for wireless systems Ranging / Distance ounding (D) Secure Ranging / Distance ounding Ranging : Obtains d(,), an estimate of d,, the actual, distance Distance bounding : Obtains D(,), a bound s.t. d, D(,) 49 5 ttacking Ranging / D ttack Implications, exchange a sequence of messages, including own measurements (e.g., times of arrival) The attacker,, provides fake inputs, to manipulate (shorten or lengthen) the d(,) calculated by Caution uthentication does not solve the problem Computation delays could dwarf measurements 51 Safe Storage Manipulation of calculated distance Illegitimate physical space access Defeating a theft detection system 52 ttacking Ranging / D (cont d) Verifier Verifier Verifier Prover Dishonest Prover Colluding Dishonest 53 Prover Mafia Fraud or Relay ttack Distance Fraud ttack Terrorist Fraud ttack Securing Ranging / D (cont d) uthenticated ranging can defeat relay (mafia fraud) attacks To defeat the distance fraud attacks: Distance-related measurements based on sufficiently fast and simple actions by the honest prover dishonest prover cannot perform the same action faster than an honest prover dishonest prover cannot appear closer to the verifier than it actually is 54 9

10 Distance ounding S. rands and D. Chaum, Distance-bounding protocols, dvances in Cryptology, EUROCRYPT (RE) Distance ounding (cont d) Distance bounding [rands & Chaum] Phase 1: Prover sends out a commitment to a random n-bit value Phase 2: Rapid it Exchange (RE); the Verifier sends 1-bit challenges to Prover, which then XOR s this with the corresponding bit of the comment t each RE, the verifier measures the round-trip (V-P- V) delay Phase 3: The Prover opens the commitment and the Verifier calculates the distance bound (the maximum of all RE-measured delays) Success of attack: 1/2 n n attacker can only guess the 1-bit responses 56 Summary [CapkunH3] - Mutual D [CapkunHubaux6] - No RE - uth. ranging [SingleePreneel7] - noise-tolerant, ½ n [randschaum93] - Mafia-resistant, ½ n [HanckeKuhn5] - Noise-tolerant, w/o noise ¾ n [MunillaOP6] - Void challenges, 3/5 n 57 old fonts: Design for resistance to terrorist fraud attacks [ussardagga4] - symmetric crypto - Proof of Knowledge [ReidGNTS6] - Symmetric crypto, ¾ n [Piramuthu7] - 7/8 n [TuPiramuthu7] [MunillaPeinado8] - 4-REs, 9/16 - [voinetchamkerten9] n [KimKSP8] - HK ¾ n n½ n, memory cost - 1/2 n [MeadowsPPChS7] [NikovVauclair8] - Rapid it-chunk Exchange [SchallerSchC9] References [voinetchamkerten9] G. voine and. Tchamkerten, n Efficient Distance ounding RFID uthentication Protocol: alancing False-cceptance Rate and Memory Requirement, ISC 29 [randschaum93] S. rands and D. Chaum, Distance-bounding protocols, EUROCRYPT 93 [ussardagga4] L. ussard and W. agga, Distance-ounding Proof of Knowledge Protocols to void Terrorist Fraud ttacks, EUROCOM Tech. Report, RR-4-19, 24 [CapkunH3] S. Capkun, L. uttyan, and J.-P. Hubaux, SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, SSN 23 [CapkunHubaux6] S. Capkun and J.P. Hubaux, Secure positioning in wireless networks, JSC 26 [HanckeKuhn5] G. Hancke and M. Kuhn, n RFID Distance ounding Protocol, SecureComm 25 [KimKSP8] C.H. Kim, G. voine, F. Koeune, F.-X. Standaert and O. Pereira, The Swiss-Knife RFID Distance ounding Protocol, ICISC References (cont d) [MeadowsPPChS7] C. Meadows, R. Poovendran, D. Pavlovic, L. Chang, and P. Syverson, Distance bounding protocols: uthentication logic analysis and collusion attacks, Sec. Loc. and Time Sync. for Wireless Sensor and d Hoc Networks, 26 [MunillaOP6] J. Munilla,. Ortiz and. Peinado, Distance ounding Protocols with Void Challenges for RFID, RFIDSec26 [MunillaPeinado8] J. Munilla and. Peinado, ttacks on Singelee and Preneel's protocol, eprint, 28 [NikovVauclair8] V. Nikov and M. Vauclair, Yet nother Secure Distance-ounding Protocol, eprint, 28 [Piramuthu7] S. Piramuthu, Protocols for RFID tag/reader authentication, Decision Support Systems 27 [ReidGNTS6] J. Reid, J. Nieto, T. Tang, and. Senadji, Detecting relay attacks with timing-based protocols, SICCS 27 [SchallerSchC9] P. Schaller,. Schmidt, D. asin, S. Capkun, Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks, CSF 29 [SingleePreneel7] D. Singelee and. Preneel, Distance ounding in Noisy Environments, ESS 27 [TuPiramuthu7] Y.-J. Tu and S. Piramuthu, RFID Distance ounding Protocols, RFID Technology ttacks at the Physical Layer External adversaries at the physical layer: Early Detection / Late Commit J. Clulow, G. Hancke, M. Kuhn, and T. Moore, So Near and Yet So Far: Distance-ounding ttacks in Wireless Networks, ESS 26 Objective: Reduce measured distance pproach: Take advantage of redundancy at the physical layer 6 1

11 ttacks at the Physical Layer (cont d) ssume OOK: 1 ttacks at the Physical Layer (cont d) Early Detection : an adversarial receiver does not wait for the end of the symbol Late Commit : an adversarial transmitter can defer its signal transmission 1 1 RX TX Honest Transmitter dversarial Receiver dversarial Transmitter Honest Receiver ttacks at the Physical Layer (cont d) Honest TX ttacks at the Physical Layer (cont d) Honest TX dversarial RX Early detection dversarial RX Early detection dversarial TX dversarial TX Late commit Honest RX Honest RX Result : Premature arrival Distance decreasing attack ttacks at the Physical Layer (cont d) Impulse Radio Ultra Wide and (IR-UW) Highly precise (sub-meter) ranging Resilience to multipath propagation IEEE a standard No rapid bit exchange ttacking IR-UW Ranging Distance-decreasing relay attack IEEE a standard Mandatory modes Energy detector receiver Early detection (ED) and late commit (LC) combined Distance decrease of up to 14m Success rate can be made arbitrarily high Transmitted signal Received signal Sampled signal (energy detector receiver) M. Fleury, M. Poturalski, P. P., J.-Y. Le oudec, and J.-P. Hubaux, Distance-decreasing ttacks gainst Secure Impulse Radio Ranging, CM WiSec

12 ttacking IR-UW Ranging (cont d) ttacking IR-UW Ranging (cont d) RX TX preamble payload Early detection (ED) preamble payload Late commit (LC) preamble payload RX 496 ns preamble symbol preamble payload TX Challenge : Transmission time and payload are not known to the adversary in advance 67 45ns ~ 135m Distance decrease Preamble 68 ttacking IR-UW Ranging (cont d) ttacking IR-UW Ranging (cont d) RX RX acquisition TX TX 496ns 45ns Preamble Preamble 69 7 ttacking IR-UW Ranging (cont d) ttacking IR-UW Ranging (cont d) Start Frame Delimiter (SFD) - - RX cquisition S RX Early SFD Normal detection SFD detection - - TX 496ns 45ns S TX S Preamble Preamble

13 ttacking IR-UW Ranging (cont d) ttacking IR-UW Ranging (cont d) Start Frame Delimiter (SFD) Start Frame Delimiter (SFD) RX Early SFD detection - - RX Early SFD detection - - TX Late SFD commit - - TX Late SFD commit Preamble Time-shift: 45ns Preamble ttacking IR-UW Ranging (cont d) ttacking IR-UW Ranging (cont d) RX TX 124ns ~7ns 8ns 1 inary PPM RX TX 124ns 8ns inary PPM 1 enign receiver >< > < 1 Payload Payload ttacking IR-UW Ranging (cont d) RX TX Payload 124ns 8ns inary PPM LC ED >< > < 1 ttacking IR-UW Ranging (cont d) RX TX Payload 124ns 8ns inary PPM LC 1 > < > < Relay time-shift 45ns = 512ns 62ns = half symbol duration early detection time 78 ED 13

14 ttacking IR-UW Ranging (cont d) ttacking IR-UW Ranging (cont d) Packet Error Ratio 1.7d Packet Error Ratio 4d RX SNR [d] Payload: Early detection Payload: Late commit 79 8 SNR [d] ttacking IR-UW Ranging (cont d) Probability of attack success Early detection SNR (RX) Late commit SNR () Summary (cont d) Physical layer attacks are PHY-specific For IR UW: >99% attack success probability 4d (RX) and 6d () higher than SNR necessary for benign operation Easily to mount attacks External adversaries High gain antennas Increased transmision power Placement close to victim devices Summary (cont d) Jail relay??? Know Your Neighbor, Keep Your Distance and other cautionary tales for wireless systems Panos Papadimitratos Joint work with M. Poturalski, M. Fleury, J.-P. Hubaux, and J.-Y. Le oudec panos.papadimitratos@epfl.ch

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks Tyler W Moore (joint work with Jolyon Clulow, Gerhard Hancke and Markus Kuhn) Computer Laboratory University of Cambridge Third European

More information

On the Physical Layer for Secure Distance Measurement

On the Physical Layer for Secure Distance Measurement On the Physical Layer for Secure Distance Measurement Srdjan Čapkun Department of Computer Science ETH Zurich All photographs, imagery, media belong to their respective owners/creators. Secure Distance

More information

Distance Bounding with IEEE a: Attacks and Countermeasures

Distance Bounding with IEEE a: Attacks and Countermeasures 1 EPFL-REPORT-150112 Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures Marcin Poturalski, Manuel Flury, Panos Papadimitratos, Jean-Pierre Hubaux, Jean-Yves Le Boudec Laboratory for Computer

More information

Distance Bounding with IEEE a: Attacks and Countermeasures

Distance Bounding with IEEE a: Attacks and Countermeasures 1 Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures Marcin Poturalski, Manuel Flury, Panos Papadimitratos, Jean-Pierre Hubaux, Jean-Yves Le Boudec Laboratory for Computer Communications

More information

arxiv: v2 [cs.cr] 18 Apr 2014

arxiv: v2 [cs.cr] 18 Apr 2014 Low-Power Distance Bounding Aanjhan Ranganathan, Boris Danev, Srdjan Capkun Institute of Information Security Dept. of Computer Science, ETH Zurich Zurich, Switzerland raanjhan@inf.ethz.ch, boris.danev@inf.ethz.ch,

More information

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks 83 So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, Tyler Moore Computer Laboratory, University of Cambridge 15 JJ Thomson Avenue,

More information

Distance Bounding with IEEE a: Attacks and Countermeasures

Distance Bounding with IEEE a: Attacks and Countermeasures 1334 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 4, APRIL 2011 Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures Marcin Poturalski, Manuel Flury, Panos Papadimitratos, Jean-Pierre

More information

Secure Location Verification with Hidden and Mobile Base Stations

Secure Location Verification with Hidden and Mobile Base Stations Secure Location Verification with Hidden and Mobile Base Stations S. Capkun, K.B. Rasmussen - Department of Computer Science, ETH Zurich M. Cagalj FESB, University of Split M. Srivastava EE Department,

More information

SecDEv: Secure Distance Evaluation in Wireless Networks

SecDEv: Secure Distance Evaluation in Wireless Networks SecDEv: Secure Distance Evaluation in Wireless Networks Gianluca Dini, Francesco Giurlanda, Pericle Perazzo Dept. of Information Engineering University of Pisa Largo Lucio Lazzarino 1, 56100 Pisa, Italy

More information

Are We Really Close? Verifying Proximity in Wireless Systems

Are We Really Close? Verifying Proximity in Wireless Systems Are We Really Close? Verifying Proximity in Wireless Systems Aanjhan Ranganathan & Srdjan Capkun Department of Computer Science ETH Zurich, Switzerland Abstract Today, with the rapid deployment of wireless

More information

SecDEv: Secure Distance Evaluation in Wireless Networks

SecDEv: Secure Distance Evaluation in Wireless Networks SecDEv: Secure Distance Evaluation in Wireless Networks Gianluca Dini, Francesco Giurlanda, Pericle Perazzo Dept. of Information Engineering University of Pisa Email: [name.surname]@iet.unipi.it Abstract

More information

Securing Wireless Localization: Living with Bad Guys. Zang Li, Yanyong Zhang, Wade Trappe Badri Nath

Securing Wireless Localization: Living with Bad Guys. Zang Li, Yanyong Zhang, Wade Trappe Badri Nath Securing Wireless Localization: Living with Bad Guys Zang Li, Yanyong Zhang, Wade Trappe Badri Nath Talk Overview Wireless Localization Background Attacks on Wireless Localization Time of Flight Signal

More information

Formal Reasoning about Physical Properties of Security Protocols

Formal Reasoning about Physical Properties of Security Protocols Formal Reasoning about Physical Properties of Security Protocols DAVID BASIN, SRDJAN CAPKUN, PATRICK SCHALLER, and BENEDIKT SCHMIDT ETH Zurich, Switzerland Traditional security protocols are mainly concerned

More information

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004 Secure Localization Services Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 24 badri@cs.rutgers.edu Importance of localization

More information

Secure Localization in Wireless Sensor Networks: A Survey

Secure Localization in Wireless Sensor Networks: A Survey Secure Localization in Wireless Sensor Networks: A Survey arxiv:1004.3164v1 [cs.cr] 19 Apr 2010 Waleed Ammar, Ahmed ElDawy, and Moustafa Youssef {ammar.w, aseldawy, moustafa}@alex.edu.eg Computer and Systems

More information

Effectiveness of Distance-Decreasing Attacks Against Impulse Radio Ranging

Effectiveness of Distance-Decreasing Attacks Against Impulse Radio Ranging Effectiveness of Distance-Decreasing Attacks Against Impulse Radio Ranging Manuel Flury, Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux, Jean-Yves Le Boudec Laboratory for Computer Communications

More information

UWB for Sensor Networks:

UWB for Sensor Networks: IEEE-UBC Symposium on future wireless systems March 10 th 2006, Vancouver UWB for Sensor Networks: The 15.4a standard Andreas F. Molisch Mitsubishi Electric Research Labs, and also at Department of Electroscience,

More information

Principles of Ad Hoc Networking

Principles of Ad Hoc Networking Principles of Ad Hoc Networking Michel Barbeau and Evangelos Kranakis November 12, 2007 Wireless security challenges Network type Wireless Mobility Ad hoc Sensor Challenge Open medium Handover implies

More information

Spectrum Sensing Brief Overview of the Research at WINLAB

Spectrum Sensing Brief Overview of the Research at WINLAB Spectrum Sensing Brief Overview of the Research at WINLAB P. Spasojevic IAB, December 2008 What to Sense? Occupancy. Measuring spectral, temporal, and spatial occupancy observation bandwidth and observation

More information

Wrong Siren! A Location Spoofing Attack on Indoor Positioning Systems: The Starbucks Case Study

Wrong Siren! A Location Spoofing Attack on Indoor Positioning Systems: The Starbucks Case Study Internet of Things Wrong Siren! A Location Spoofing Attack on Indoor Positioning Systems: The Starbucks Case Study Junsung Cho, Jaegwan Yu, Sanghak Oh, Jungwoo Ryoo, JaeSeung Song, and Hyoungshick Kim

More information

Collaborative transmission in wireless sensor networks

Collaborative transmission in wireless sensor networks Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg

More information

SourceSync. Exploiting Sender Diversity

SourceSync. Exploiting Sender Diversity SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored

More information

Project: IEEE P Working Group for Wireless Personal Area Networks N

Project: IEEE P Working Group for Wireless Personal Area Networks N Project: IEEE P802.15 Working Group for Wireless Personal Area Networks N (WPANs( WPANs) Title: [IMEC UWB PHY Proposal] Date Submitted: [4 May, 2009] Source: Dries Neirynck, Olivier Rousseaux (Stichting

More information

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Interleaving And Channel Encoding Of Data Packets In Wireless Communications Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218

More information

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang WINLAB, Rutgers University IAB 2004 Roadmap Motivation and Introduction

More information

Wireless Security gets Physical

Wireless Security gets Physical Wireless Security gets Physical Srdjan Čapkun Department of Computer Science ETH Zurich SWING, Bertinoro, July 2008 Secure Localization in Wireless Networks Importance of Correct Location Information Safety

More information

Safeguarding Wireless Service Access

Safeguarding Wireless Service Access Safeguarding Wireless Service Access Panos Papadimitratos Electrical and Computer Engineering Virginia Tech Wireless Service Access Service Access Points Users Wireless Service Access (cont d) Ad Hoc Networking

More information

On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets

On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets Mohammed Eltayeb*, Junil Choi*, Tareq Al-Naffouri #, and Robert W. Heath Jr.* * Wireless Networking and Communications

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

MIMO-Based Vehicle Positioning System for Vehicular Networks

MIMO-Based Vehicle Positioning System for Vehicular Networks MIMO-Based Vehicle Positioning System for Vehicular Networks Abduladhim Ashtaiwi* Computer Networks Department College of Information and Technology University of Tripoli Libya. * Corresponding author.

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative

More information

Introduction to IS-95 CDMA p. 1 What is CDMA p. 1 History of CDMA p. 2 Forms of CDMA p MHz CDMA p MHz CDMA (PCS) p. 6 CDMA Parts p.

Introduction to IS-95 CDMA p. 1 What is CDMA p. 1 History of CDMA p. 2 Forms of CDMA p MHz CDMA p MHz CDMA (PCS) p. 6 CDMA Parts p. Introduction to IS-95 CDMA p. 1 What is CDMA p. 1 History of CDMA p. 2 Forms of CDMA p. 3 800 MHz CDMA p. 6 1900 MHz CDMA (PCS) p. 6 CDMA Parts p. 7 Mobile Station p. 8 Base Station Subsystem (BSS) p.

More information

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR 5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden

More information

Robust Key Establishment in Sensor Networks

Robust Key Establishment in Sensor Networks Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research

More information

5588 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER 2015

5588 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 10, OCTOBER 2015 5588 IEEE TRNSCTIONS ON WIRELESS COMMUNICTIONS, VOL. 14, NO. 10, OCTOBER 2015 Jamming-Resilient Secure Neighbor Discovery in Mobile d Hoc Networks Rui Zhang, Member, IEEE, Jingchao Sun, Student Member,

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,

More information

Revisiting Neighbor Discovery with Interferences Consideration

Revisiting Neighbor Discovery with Interferences Consideration Author manuscript, published in "3rd ACM international workshop on Performance Evaluation of Wireless Ad hoc, Sensor and Ubiquitous Networks (PEWASUN ) () 7-1" DOI : 1.115/1131.1133 Revisiting Neighbor

More information

Mathematical Problems in Networked Embedded Systems

Mathematical Problems in Networked Embedded Systems Mathematical Problems in Networked Embedded Systems Miklós Maróti Institute for Software Integrated Systems Vanderbilt University Outline Acoustic ranging TDMA in globally asynchronous locally synchronous

More information

UNDERSTANDING AND MITIGATING

UNDERSTANDING AND MITIGATING UNDERSTANDING AND MITIGATING THE IMPACT OF RF INTERFERENCE ON 802.11 NETWORKS RAMAKRISHNA GUMMADI UCS DAVID WETHERALL INTEL RESEARCH BEN GREENSTEIN UNIVERSITY OF WASHINGTON SRINIVASAN SESHAN CMU 1 Presented

More information

Weak-Signal Radio Communications for Bitcoin Network Resilience. Nick Szabo, Elaine Ou globalfinancialaccess.com Scaling Bitcoin 2017

Weak-Signal Radio Communications for Bitcoin Network Resilience. Nick Szabo, Elaine Ou globalfinancialaccess.com Scaling Bitcoin 2017 Weak-Signal Radio Communications for Bitcoin Network Resilience Nick Szabo, Elaine Ou globalfinancialaccess.com Scaling Bitcoin 2017 What is Weak-Signal HF Radio? Radio transmission using shortwave frequencies

More information

Wireless Sensor Networks

Wireless Sensor Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless

More information

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks

More information

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous

More information

From Securing Navigation Systems to Securing Wireless Communication Through Location-Awareness

From Securing Navigation Systems to Securing Wireless Communication Through Location-Awareness From Securing Navigation Systems to Securing Wireless Communication Through Location-Awareness Srdjan Čapkun Department of Computer Science ETH Zürich Purdue, 17.10.2007 Age of wireless communication...

More information

Repelling Sybil-type attacks in wireless ad hoc systems

Repelling Sybil-type attacks in wireless ad hoc systems Outline Repelling Sybil-type attacks in wireless ad hoc systems Marek Klonowski Michał Koza Mirosław Kutyłowski Institute of Mathematics and Computer Science, Wrocław University of Technology ACISP 2,

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

Secure Ad-Hoc Routing Protocols

Secure Ad-Hoc Routing Protocols Secure Ad-Hoc Routing Protocols ARIADNE (A secure on demand RoutIng protocol for Ad-Hoc Networks & TESLA ARAN (A Routing protocol for Ad-hoc Networks SEAD (Secure Efficient Distance Vector Routing Protocol

More information

A Primary User Authentication System for Mobile Cognitive Radio Networks

A Primary User Authentication System for Mobile Cognitive Radio Networks A Primary User Authentication System for Mobile Cognitive Radio Networks (Invited Paper) Swathi Chandrashekar and Loukas Lazos Dept. of Electrical and Computer Engineering University of Arizona, Tucson,

More information

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area

More information

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation

More information

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing

More information

Investigation and Improvements to the OFDM Wi-Fi Physical Layer Abstraction in ns-3 Workshop on ns-3 June 15, 2016

Investigation and Improvements to the OFDM Wi-Fi Physical Layer Abstraction in ns-3 Workshop on ns-3 June 15, 2016 Investigation and Improvements to the OFDM Wi-Fi Physical Layer Abstraction in ns-3 Workshop on ns-3 June 15, 2016 Hossein-Ali Safavi-Naeini, Farah Nadeem, Sumit Roy University of Washington Goals of this

More information

Anti-Jamming: A Study

Anti-Jamming: A Study Anti-Jamming: A Study Karthikeyan Mahadevan, Sojeong Hong, John Dullum December 14, 25 Abstract Addressing jamming in wireless networks is important as the number of wireless networks is on the increase.

More information

Engineering Project Proposals

Engineering Project Proposals Engineering Project Proposals (Wireless sensor networks) Group members Hamdi Roumani Douglas Stamp Patrick Tayao Tyson J Hamilton (cs233017) (cs233199) (cs232039) (cs231144) Contact Information Email:

More information

Application Note AN041

Application Note AN041 CC24 Coexistence By G. E. Jonsrud 1 KEYWORDS CC24 Coexistence ZigBee Bluetooth IEEE 82.15.4 IEEE 82.11b WLAN 2 INTRODUCTION This application note describes the coexistence performance of the CC24 2.4 GHz

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks

Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu and Tao Wang Abstract In wireless networks, location distinction aims to detect

More information

Wormhole-Based Anti-Jamming Techniques in Sensor. Networks

Wormhole-Based Anti-Jamming Techniques in Sensor. Networks Wormhole-Based Anti-Jamming Techniques in Sensor Networks Mario Čagalj Srdjan Čapkun Jean-Pierre Hubaux Laboratory for Computer Communications and Applications (LCA) Faculty of Informatics and Communication

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 24730-62 First edition 2013-09-01 Information technology Real time locating systems (RTLS) Part 62: High rate pulse repetition frequency Ultra Wide Band (UWB) air interface

More information

Modeling Infrared LANs in GloMoSim. Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University

Modeling Infrared LANs in GloMoSim. Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University Modeling Infrared LANs in GloMoSim Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University Talk Outline Motivation and Applications for Infrared Wireless

More information

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer

More information

Time Iteration Protocol for TOD Clock Synchronization. Eric E. Johnson. January 23, 1992

Time Iteration Protocol for TOD Clock Synchronization. Eric E. Johnson. January 23, 1992 Time Iteration Protocol for TOD Clock Synchronization Eric E. Johnson January 23, 1992 Introduction This report presents a protocol for bringing HF stations into closer synchronization than is normally

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

Link-state protocols and Open Shortest Path First (OSPF)

Link-state protocols and Open Shortest Path First (OSPF) Fixed Internetworking Protocols and Networks Link-state protocols and Open Shortest Path First (OSPF) Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 0 ITIFN Objectives Describe the basic

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense

More information

Joint communication, ranging, and positioning in low data-rate UWB networks

Joint communication, ranging, and positioning in low data-rate UWB networks Joint communication, ranging, and positioning in low data-rate UWB networks Luca De Nardis, Maria-Gabriella Di Benedetto a a University of Rome La Sapienza, Rome, Italy, e-mails: {lucadn, dibenedetto}@newyork.ing.uniroma1.it

More information

Distance Bounding Protocols on TH-UWB Link and their Analysis over Noisy Channels

Distance Bounding Protocols on TH-UWB Link and their Analysis over Noisy Channels Distance Bounding Protocols on TH-UWB Link and their Analysis over Noisy Channels Ahmed Benfarah, Benoit Miscopein, Jean-Marie Gorce, Cédric Lauradoux, Bernard Roux To cite this version: Ahmed Benfarah,

More information

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA 98195-2500 {l lazos,

More information

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: Toshiba Proposal for IEEE802.15.3e CFP (Full Proposal) Date Submitted: 8 July 2015 Source: Ko Togashi Company: Toshiba

More information

A High-Precision Ultra Wideband Impulse Radio Physical Layer Model for Network Simulation

A High-Precision Ultra Wideband Impulse Radio Physical Layer Model for Network Simulation A High-Precision Ultra Wideband Impulse Radio Physical Layer Model for Network Simulation Jérôme Rousselot, Jean-Dominique Decotignie 2 nd Omnet++ Workshop, Rome, 6.3.2009 Overview Research Problem and

More information

Comparison between Preamble Sampling and Wake-Up Receivers in Wireless Sensor Networks

Comparison between Preamble Sampling and Wake-Up Receivers in Wireless Sensor Networks Comparison between Preamble Sampling and Wake-Up Receivers in Wireless Sensor Networks Richard Su, Thomas Watteyne, Kristofer S. J. Pister BSAC, University of California, Berkeley, USA {yukuwan,watteyne,pister}@eecs.berkeley.edu

More information

IN recent years, there has been great interest in the analysis

IN recent years, there has been great interest in the analysis 2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We

More information

Location Privacy of Distance Bounding Protocols

Location Privacy of Distance Bounding Protocols Location rivacy of Distance Bounding rotocols Kasper Bonne Rasmussen Department of Computer Science ETH Zurich 809 Zurich, Switzerland kasperr@inf.ethz.ch Srdjan Čapkun Department of Computer Science ETH

More information

Underwater Communication in 2.4 Ghz ISM Frequency Band for Submarines

Underwater Communication in 2.4 Ghz ISM Frequency Band for Submarines Underwater Communication in 2.4 Ghz ISM Frequency Band for Submarines S.Arulmozhi 1, M.Ashokkumar 2 PG Scholar, Department of ECE, Adhiyamaan College of Engineering, Hosur, Tamilnadu, India 1 Asst. Professor,

More information

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: Toshiba Proposal for IEEE802.15.3e CFP (Full Proposal) Date Submitted: 8 July 2015 Source: Ko Togashi Company: Toshiba

More information

Practical Attacks on Proximity Identification Systems (Short Paper)

Practical Attacks on Proximity Identification Systems (Short Paper) Practical Attacks on Proximity Identification Systems (Short Paper) Gerhard P. Hancke University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK gh275@cl.cam.ac.uk Abstract

More information

Randomized Channel Hopping Scheme for Anti-Jamming Communication

Randomized Channel Hopping Scheme for Anti-Jamming Communication Randomized Channel Hopping Scheme for Anti-Jamming Communication Eun-Kyu Lee, Soon Y. Oh, and Mario Gerla Computer Science Department University of California at Los Angeles, Los Angeles, CA, USA {eklee,

More information

Power-Modulated Challenge-Response Schemes for Verifying Location Claims

Power-Modulated Challenge-Response Schemes for Verifying Location Claims Power-Modulated Challenge-Response Schemes for Verifying Location Claims Yu Zhang, Zang Li, Wade Trappe WINLAB, Rutgers University, Piscataway, NJ 884 {yu, zang, trappe}@winlab.rutgers.edu Abstract Location

More information

Ranging in the IEEE a Standard

Ranging in the IEEE a Standard MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Ranging in the IEEE 802.15.4a Standard Zafer Sahinoglu, Sinan Gezici TR2006-097 December 2006 Abstract The emerging IEEE 802.15.4a standard

More information

Communication Networks. Braunschweiger Verkehrskolloquium

Communication Networks. Braunschweiger Verkehrskolloquium Simulation of Car-to-X Communication Networks Braunschweiger Verkehrskolloquium DLR, 03.02.2011 02 2011 Henrik Schumacher, IKT Introduction VANET = Vehicular Ad hoc NETwork Originally used to emphasize

More information

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)

More information

Attack-Resistant Location Estimation in Sensor Networks (Revised August 2005)

Attack-Resistant Location Estimation in Sensor Networks (Revised August 2005) Attack-Resistant Location Estimation in Sensor Networks (Revised August 2005) Donggang Liu The University of Texas at Arlington and Peng Ning North Carolina State University and Wenliang Kevin Du Syracuse

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,

More information

Multi-hop Networks with Cooperative Relaying Assisted Links

Multi-hop Networks with Cooperative Relaying Assisted Links c IEEE, 2013. This is the author s version of the work. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purpose or for

More information

Data Dissemination in Wireless Sensor Networks

Data Dissemination in Wireless Sensor Networks Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks

More information

A Review of Vulnerabilities of ADS-B

A Review of Vulnerabilities of ADS-B A Review of Vulnerabilities of ADS-B S. Sudha Rani 1, R. Hemalatha 2 Post Graduate Student, Dept. of ECE, Osmania University, 1 Asst. Professor, Dept. of ECE, Osmania University 2 Email: ssrani.me.ou@gmail.com

More information

Cooperative Routing in Wireless Networks

Cooperative Routing in Wireless Networks Cooperative Routing in Wireless Networks Amir Ehsan Khandani Jinane Abounadi Eytan Modiano Lizhong Zheng Laboratory for Information and Decision Systems Massachusetts Institute of Technology 77 Massachusetts

More information

Bringing Multi-Antenna Gain to Energy-Constrained Wireless Devices Sanjib Sur, Teng Wei, Xinyu Zhang

Bringing Multi-Antenna Gain to Energy-Constrained Wireless Devices Sanjib Sur, Teng Wei, Xinyu Zhang Bringing Multi-Antenna Gain to Energy-Constrained Wireless Devices Sanjib Sur, Teng Wei, Xinyu Zhang University of Wisconsin - Madison 1 Power Consumption of MIMO MIMO boosts the wireless throughput by

More information

Wormhole-Based Anti-Jamming Techniques in Sensor. Networks

Wormhole-Based Anti-Jamming Techniques in Sensor. Networks Wormhole-Based Anti-Jamming Techniques in Sensor Networks Mario Čagalj Srdjan Čapkun Jean-Pierre Hubaux Laboratory for Computer Communications and Applications (LCA) Faculty of Informatics and Communication

More information

Research Article A Joint Vehicle-Vehicle/Vehicle-Roadside Communication Protocol for Highway Traffic Safety

Research Article A Joint Vehicle-Vehicle/Vehicle-Roadside Communication Protocol for Highway Traffic Safety Vehicular Technology Volume 211, Article ID 71848, 1 pages doi:1.1155/211/71848 Research Article A Joint Vehicle-Vehicle/Vehicle-Roadside Communication Protocol for Highway Traffic Safety Bin Hu and Hamid

More information

Localization (Position Estimation) Problem in WSN

Localization (Position Estimation) Problem in WSN Localization (Position Estimation) Problem in WSN [1] Convex Position Estimation in Wireless Sensor Networks by L. Doherty, K.S.J. Pister, and L.E. Ghaoui [2] Semidefinite Programming for Ad Hoc Wireless

More information

White Space Security: Securing our Spectral Resources. (Aka: Its going to be hard to understand what s going on in order to secure spectrum )

White Space Security: Securing our Spectral Resources. (Aka: Its going to be hard to understand what s going on in order to secure spectrum ) White Space Security: Securing our Spectral Resources (Aka: Its going to be hard to understand what s going on in order to secure spectrum ) Wade Trappe Setting the Stage Currently, 90% of licensed spectrum

More information

PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION

PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION Patrick Tague, Mingyan Li, and Radha Poovendran Network Security Lab NSL, Department of Electrical Engineering, University

More information

Scalable Routing Protocols for Mobile Ad Hoc Networks

Scalable Routing Protocols for Mobile Ad Hoc Networks Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview

More information

Detecting Malicious Nodes in RSS-Based Localization

Detecting Malicious Nodes in RSS-Based Localization Detecting Malicious Nodes in RSS-Based Localization Manas Maheshwari*, Sai Ananthanarayanan P.R.**, Arijit Banerjee*, Neal Patwari**, Sneha K. Kasera* *School of Computing University of Utah Salt Lake

More information

FAQs about OFDMA-Enabled Wi-Fi backscatter

FAQs about OFDMA-Enabled Wi-Fi backscatter FAQs about OFDMA-Enabled Wi-Fi backscatter We categorize frequently asked questions (FAQs) about OFDMA Wi-Fi backscatter into the following classes for the convenience of readers: 1) What is the motivation

More information