• 제목/요약/키워드: physical-layer security

검색결과 107건 처리시간 0.034초

An Intelligent Machine Learning Inspired Optimization Algorithm to Enhance Secured Data Transmission in IoT Cloud Ecosystem

  • Ankam, Sreejyothsna;Reddy, N.Sudhakar
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.83-90
    • /
    • 2022
  • Traditional Cloud Computing would be unable to safely host IoT data due to its high latency as the number of IoT sensors and physical devices accommodated on the Internet grows by the day. Because of the difficulty of processing all IoT large data on Cloud facilities, there hasn't been enough research done on automating the security of all components in the IoT-Cloud ecosystem that deal with big data and real-time jobs. It's difficult, for example, to build an automatic, secure data transfer from the IoT layer to the cloud layer, which incorporates a large number of scattered devices. Addressing this issue this article presents an intelligent algorithm that deals with enhancing security aspects in IoT cloud ecosystem using butterfly optimization algorithm.

A Review on IoT: Layered Architecture, Security Issues and Protocols

  • Tooba Rashid;Sumbal Mustafa
    • International Journal of Computer Science & Network Security
    • /
    • 제23권9호
    • /
    • pp.100-110
    • /
    • 2023
  • The Internet of Things (IoT) is the most creative and focused technology to be employed today. It increases the living conditions of both individuals and society. IoT offers the ability to recognize and incorporate physical devices across the globe through a single network by connecting different devices by using various technologies. As part of IoTs, significant questions are posed about access to computer and user privacy-related personal details. This article demonstrates the three-layer architecture composed of the sensor, routing, and implementation layer, respectively, by highlighting the security risks that can occur in various layers of an IoT architecture. The article also involves countermeasures and a convenient comparative analysis by discussing major attacks spanning from detectors to application. Furthermore, it deals with the basic protocols needed for IoT to establish a reliable connection between objects and items.

노지재배 스마트팜의 문제점을 해결하기 위한 LoRa 기술 분석 (Technical Analysis of LoRa for Problems on Outdoor Culture Smart Farm)

  • 이재찬;전상현;이준영;경연웅
    • 미래기술융합논문지
    • /
    • 제2권1호
    • /
    • pp.1-7
    • /
    • 2023
  • 최근, 무선 통신 기술을 활용하여 스마트팜 환경을 개선하고자 하는 연구가 지속되고 있다. 본 논문에서는 노지 스마트팜 환경에서 발생하는 문제점에 대해 소개하고, 이들을 해결하기 위한 통신 기술적 고려사항을 다루고자 했다. 노지 스마트팜 환경에 적용하기 위한 후보 기술로 LoRa, Sigfox, NB-IoT, WiFi를 선정했고, 현재 사용되고 있는 국내 스마트팜 기술의 문제점 및 방향성을 기반으로 설치 비용, 통신 범위, 데이터 전송 속도, 배터리 수명, 가격 등을 고려하여 각각의 후보 기술을 분석하여, 최종적으로 LoRa 기술이 가장 적합한 것으로 판단했다. 자세한 기술적 분석을 위해 본 논문에서는 LoRa의 물리 계층과 Medium Access Control (MAC) 계층 기술, 그리고 보안에 대해 소개하였고, 특히 물리 계층의 변조기법, MAC 계층에서의 Class (Class A, B, C) 기반 프로토콜 동작 방법, 그리고 LoRa 버전별 보안 아키텍처에 대해 기술했다.

무선네트워크에서의 보안기술 분석 (The Analysis of Security in Wirless Sensor Netwroks)

  • 변병길;이기영
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2005년도 춘계종합학술대회
    • /
    • pp.569-572
    • /
    • 2005
  • 인터넷의 발달로 인하여 네트워크의 편익성을 느낀 세대가 무선네트워크의 실현을 재촉하고 있다. 그러나 무선네트워크에서의 보안은 모든 예상가능한 공격으로부터 시작되어야 하는데 특히 L1계층에서 L7계층까지 고려되어야 하겠다. 유선에 비하여 다양한 센서단말기와 보이지 않는 전파망을 이용한 침입등이 보안에 취약하다고 하겠다. 더욱이 무선네트워크는 센서네트워크라고 할만큼 밀접한 관계이므로 센서네트워크에도 적용이 되는 보안제안이 있어야 하겠다. 물리적계층, 네트워크계층, 응용계층에서의 보안제안을 알아보고 향후 무선네트워크의 보안 개발점을 논하고자 한다.

  • PDF

A New Low-BMR Quantization Method for Wireless Channel Characteristics-based Secret Key Generation

  • Wang, Qiuhua;Lyu, Qiuyun;Wang, Xiaojun;BAO, Jianrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권10호
    • /
    • pp.5080-5097
    • /
    • 2017
  • Channel characteristics-based secret key generation is an effective physical-layer security method. The issues of how to remove the effect of random noise and to balance the key generation rate (KGR) and the bit mismatch rate (BMR) are needed to be addressed. In this paper, to reduce the effect of random noise and extract more secret bits, a new quantization scheme with high key generation rate and low bit mismatch rate is proposed. In our proposed scheme, we try to use all measurements and correct the differences caused by noise at the boundary regions instead of simply dropping them. We evaluate and discuss the improvements of our proposed scheme. The results show that our proposed scheme achieves lower bit mismatch rate as well as remaining high key generation rate.

Multiple Eavesdropper-Based Physical Layer Security in SIMO System With Antenna Correlation

  • Sun, Gangcan;Liu, Mengge;Han, Zhuo;Zhao, Chuanyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.422-436
    • /
    • 2020
  • In this paper, we investigate the impact of antenna correlation on secure transmission in a multi-eavesdropper single-input multiple-output (SIMO) system, where the receiver and eavesdroppers are equipped with correlated antennas. Based on the practical passive eavesdropping system, the new closed-form expressions of secrecy outage probability (SOP) and non-zero secrecy capacity probability are derived to explore the effect of antenna correlation on the system with multiple eavesdroppers. To further analyze the secrecy performance of the investigated system, we theoretically derive the expression of asymptotic SOP to clearly show the diversity order and array gain. Finally, Monte Carlo simulations verify the effectiveness of our theoretical results.

Secure Transmission for Two-Way Vehicle-to-Vehicle Networks with an Untrusted Relay

  • Gao, Zhenzhen
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제4권6호
    • /
    • pp.443-449
    • /
    • 2015
  • This paper considers the physical layer security problem for a two-way vehicle-to-vehicle network, where the two source vehicles can only exchange information through an untrusted relay vehicle. The relay vehicle helps the two-way transmission but also acts as a potential eavesdropper. Each vehicle has a random velocity. By exploiting the random carrier frequency offsets (CFOs) caused by random motions, a secure double-differential two-way relay scheme is proposed. While achieving successful two-way transmission for the source vehicles, the proposed scheme guarantees a high decoding error floor at the untrusted relay vehicle. Average symbol error rate (SER) performance for the source vehicles and the untrusted relay vehicle is analyzed. Simulation results are provided to verify the proposed scheme.

The Design of Remote Monitoring and Warning System for Dangerous Chemicals Based on CPS

  • Kan, Zhe;Wang, Xiaolei
    • Journal of Information Processing Systems
    • /
    • 제15권3호
    • /
    • pp.632-644
    • /
    • 2019
  • The remote monitoring and warning system for dangerous chemicals is designed with the concept of the Cyber-Physical System (CPS) in this paper. The real-time perception, dynamic control, and information service of major hazards chemicals are realized in this CPS system. The CPS system architecture, the physical layer and the applacation layer, are designed in this paper. The terminal node is mainly composed of the field collectors which complete the data acquisition of sensors and video in the physical layers, and the use of application layer makes CPS system safer and more reliable to monitor the hazardous chemicals. The cloud application layer completes the risk identification and the prediction of the major hazard sources. The early intelligent warning of the major dangerous chemicals is realized and the security risk images are given in the cloud application layer. With the CPS technology, the remote network of hazardous chemicals has been completed, and a major hazard monitoring and accident warning online system is formed. Through the experiment of the terminal node, it can be proved that the terminal node can complete the mass data collection and classify. With this experiment it can be obtained the CPS system is safe and effective. In order to verify feasible, the multi-risk warning based on CPS is simulated, and results show that the system solves the problem of hazardous chemicals enterprises safety management.

기가비트 이더넷 망에서 OFB 방식을 이용한 물리 계층 프레임 보안 기법 (Frame security method in physical layer using OFB over Gigabit Ethernet Network)

  • 임성렬
    • 인터넷정보학회논문지
    • /
    • 제22권5호
    • /
    • pp.17-26
    • /
    • 2021
  • 본 논문은 기가비트 이더넷 망에서 AES 알고리즘을 적용한 OFB 방식의 암호화/복호화를 이용한 물리 계층 프레임 보안 기법에 관한 것이다. 기가비트 이더넷 망에서 데이터 송수신시에 프레임을 보안 강도가 강력한 AES 알고리즘을 적용한 OFB 방식의 암호화/복호화를 수행하는 물리 계층에서의 데이터 보안 기법을 제안한다. 일반적으로 기가비트 이더넷망 운영 시에 보안 기능이 없으나 데이터 보안이 필요할 경우에 본 기법을 적용한 장치를 부가적으로 설치하여 보안 기능을 수행할 수가 있다. 기가비트 이더넷 망에서 데이터 전송 시에 이더넷 프레임은 IEEE 802.3 규격에 준하는 데 이 프레임에는 데이터 필드 외에도 수신 노드에서 데이터의 올바른 수신을 보장하기 위한 몇 개의 필드가 포함되어 있다. 암호화 시에는 이러한 영역을 제외한 데이터 영역만 암호화하여 실시간으로 전송하여 주어야 한다. 본 논문에서는 평문으로 구성된 IEEE802.3 프레임의 데이터 영역만 송신노드에서 암호화하여 전송한 프레임을 수신 노드에서 수신한 후 데이터 영역만 복호화하여 전송된 평문이 복구됨을 확인하여 암호화/복호화가 가능함을 보여준다. 일반적으로 보안 기능이 없이 운용하는 이더넷 망에서 데이터에 대한 보안이 요구될 시에 본 기법을 적용한 장치를 부가적으로 설치함으로서 시스템의 신뢰성을 높일 수 있다.

Adaptation of the parameters of the physical layer of data transmission in self-organizing networks based on unmanned aerial vehicles

  • Surzhik, Dmitry I.;Kuzichkin, Oleg R.;Vasilyev, Gleb S.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.23-28
    • /
    • 2021
  • The article discusses the features of adaptation of the parameters of the physical layer of data transmission in self-organizing networks based on unmanned aerial vehicles operating in the conditions of "smart cities". The concept of cities of this type is defined, the historical path of formation, the current state and prospects for further development in the aspect of transition to "smart cities" of the third generation are shown. Cities of this type are aimed at providing more comfortable and safe living conditions for citizens and autonomous automated work of all components of the urban economy. The perspective of the development of urban mobile automated technical means of infocommunications is shown, one of the leading directions of which is the creation and active use of wireless self-organizing networks based on unmanned aerial vehicles. The advantages of using small-sized unmanned aerial vehicles for organizing networks of this type are considered, as well as the range of tasks to be solved in the conditions of modern "smart cities". It is shown that for the transition to self-organizing networks in the conditions of "smart cities" of the third generation, it is necessary to ensure the adaptation of various levels of OSI network models to dynamically changing operating conditions, which is especially important for the physical layer. To maintain an acceptable level of the value of the bit error probability when transmitting command and telemetry data, it is proposed to adaptively change the coding rate depending on the signal-to-noise ratio at the receiver input (or on the number of channel decoder errors), and when transmitting payload data, it is also proposed to adaptively change the coding rate together with the choice of modulation methods that differ in energy and spectral efficiency. As options for the practical implementation of these solutions, it is proposed to use an approach based on the principles of neuro-fuzzy control, for which examples of determining the boundaries of theoretically achievable efficiency are given.