Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
5 pages
1 file
The technological innovation has enabled the spread of safety-related systems in many domains, such as public transport, energy, and medical devices. In these applications, security is one of the primary concerns. This paper proposes a watermark-based blind physical layer security (WBPLSec) utilizing a jamming receiver in conjunction with spread spectrum watermarking technique. The outage probability of the secrecy capacity is analytically derived, being regardless of the eavesdropper position. Results indicate the WBPLSec a valuable technique for deploying physical layer security creating a secure region around the receiver, such as the legitimate medical device.
Transactions on Emerging Telecommunications Technologies, 2016
Wireless communications' infrastructures are frequently selected as a cable replacement in many applications giving an immediate advantage on the wireless investment. However, the worldwide proliferation of wireless local area network (WLAN) imposed large investments on the network security. In the early days of Internet, its layered protocol stack did not consider security as a primary concern. Since then a significant amount of literature has been published. This paper proposes a watermark-based blind physical layer security (WBPLSec) utilizing a jamming receiver in conjunction with the spread spectrum watermarking technique. The outage probability of the secrecy capacity is analytically derived, regardless of the eavesdropper position. The theoretical analysis let us draw a secure region around the legitimate receiver. Results indicate how the WBPLSec aims to be a valuable technique for deploying physical layer security. Authors utilized two performance metrics, the outage probability of secrecy capacity for assessing the secure communication effectiveness and the error probability for evaluating the watermark extraction process. Finally, the proposed protocol improves the secrecy capacity performance if compared to other protocols and moreover it has a lower energy consumption.
BODYNETS 2018 - 13th EAI International Conference on Body Area Networks, 2018
Wireless body area networks (WBAN) are becoming common to collect humans' information. For example patients' vital signs in hospital scenarios. Recently, the interest of cyber-criminals to this information has gone up. Physical layer security is a standalone solution for low-power sensors network and WBAN. This paper describes the application of the watermark-based blind physical layer security (WBPLSec) to audio communications. Results indicate the WBPLSec as valuable technique for WBAN scenarios in which a sensor does not have any additional radio frequency (RF) interface but only a microphone and loudspeakers. Using this technique, the legitimate receiver creates a secure region around itself up to 50 cm. Due to the low data-rate, this technique is a valuable method for key exchange protocol between nodes with a good level of confidentiality.
Acta Universitatis Ouluensis. C, Technica, 2016
The worldwide success of wireless communications was originally fueled by the possibility to replace existing cables with wireless solutions. This phenomenon imposed the development of security engineering as a multidisciplinary field. Although wireless solutions can reduce installation costs and allow introducing new services, the end–users expect it to have the same level of security as they would normally have with wired solutions. Secure communications is an important part of the overall security of industrial wireless communications systems (IWCS). The aim of this thesis is to develop new security engineering methodologies for IWCS. The author develops countermeasures against confidentiality and integrity attacks and carries out a security analysis covering the protocol, electromagnetic and physical layer. In the first part of the thesis, Host Identity Protocol (HIP) is utilized to secure communication in an intra–vehicular network. Simulations and measurement campaigns are also conducted to evaluate the impact of the overhead on security in a tunnel, considering line–of–sight (LOS) and non–LOS (NLOS) scenarios. Electromagnetic analysis (EMA) is an important step in the development of safety–related systems. Today, the increasing usage of smaller integrated circuit also increases the susceptibility to electromagnetic (EM) interference. From near–field (NF) to far–field (FF) transformation, a method for the evaluation of the emissions leakage is investigated. The virtual EM (VEM) interface of the device–under–test (DUT) is studied, and it is described how an adversary can exploit it for denial of service (DoS) attacks. An effective jamming attack model is studied, and the theoretical calculations are validated with experiment–based results. Finally, focusing attention on physical layer security, two algorithms are developed. Active radio frequency fingerprinting (RFF) implements the exchange of a public key during the setup of secure communication. Afterwards, utilizing a jamming receiver in conjunction with the spread spectrum (SS) watermarking technique, the watermark–based blind physical layer security (WBPLSec) protocol is presented. The analysis and results indicate how the WBPLSec seems to be a valuable technique for deploying physical layer security by creating a secure region around the receiver.
22nd Digital Avionics Systems Conference Proceedings (Cat No 03CH37449) DASC-03, 2003
Controller-pilot Very High Frequency (VHF) voice communication in Air Traffic Control (ATC) relies on amplitude modulation by a carrier frequency of the transmitted analogue voice pattern. This technology is known for its poor voice quality and to be highly sensitive for any kind of noise on the transmission/ reception path. On this party-line pilots have to identify themselves with their callsign. Human's imperfections in speaking and understanding added to the low channel quality may cause problems to identify the originator of an Aircraft (AC) message without any ambiguity for the controller. The proposed Aircraft Identification Tag (AIT) technique aims at overcoming this security lag. The automatic insertion of the supplementary AIT in the transmitted voice communication will secure and simplify the association of a voice message to the specific AC. Supplementary safety increase may be achieved by the mental reinforcement of the audible stimulus (pilot's voice) with a simultaneous visual stimulus in form of e.g. highlighted AC track on the Radar screen. Further security increase may be attended from the fact that fake AC VHF transmissions (e.g. jokers, terrorists, …) becomes more difficult or even may be impossible by special watermark coding. Simple airfield structures and oceanic High Frequency (HF) communication could benefit from such a system, too. AIT technique, therefore, uses proven audio watermark techniques (e.g. used for intellectual property rights for audio CD and digital video). These watermarks are introduced in the voice signal such that, the watermarks are not noticeable. AC and ATC VHF-transceiver need no change. The technique is adapted to the reduced VHF channel spacing of 8.33kHz. The prototype demonstrator shows very high robustness with a watermark datalink capacity of about 100 bits per second including security data to ensure payload data integrity.
IET Communications, 2014
International Journal of Wireless Information Networks, 2019
Technological advances have proliferated in several sectors by developing additional capabilities in the field of systems engineering. These improvements enabled the deployment of new and smart products. Today, wireless body area networks (WBAN) are commonly used to collect humans' information, hence this evolution exposes wireless systems to new security threats. Recently, the interest by cyber-criminals in this information has increased. Many of these wireless devices are equipped with passive speakers and microphones that may be used to exchange data with each other. This paper describes the application of the watermark-based blind physical layer security (WBPLSec) to acoustic communications as unconventional wireless link. Since wireless sensors have a limited computation power the WBPLSec is a valuable physical layer standalone solution to save energy. Actually, this protocol does not need any additional radio frequency (RF) connection. Indeed, it combines watermarking and a jamming techniques over sound-waves to create secure region around the legitimate receiver. Due to their nature, wireless communications might experience eavesdropping attacks. The analysis proposed in this paper, addresses countermeasures against confidentiality attacks on short-range wireless communications. The experiments over the acoustic air-gap channel showed that WBPLSec can create a region two meters wide in which wireless nodes are able to communicate securely. Therefore, the results favor the use of this scheme as a key enabling technology to protect the confidentiality in wireless sensor networks.
2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON), 2017
Spread Spectrum Watermarking is an emerging area in digital information security. Building from the security provided by this technology in Communication Engineering, one could leverage the same concept to hide patient data securely in a medical image to be transmitted to a remote physician for diagnostic purposes. Spread spectrum is known to hide information as low-power noise using coding sequences with high auto-correlation but low cross-correlation. This ensures that only recipients with the appropriate key can decode the information hidden in the cover and also that more than one user could hide data in the same cover without significant interference. Attackers would find it difficult to decode or even destroy the hidden information without destroying the cover itself. However, there are certain challenges such as amount of information that could be hidden, the fidelity of the information retrieved after unintentional processing and possibility of added information reducing the...
Entropy, 2020
The open nature of radio propagation enables ubiquitous wireless communication. This allows for seamless data transmission. However, unauthorized users may pose a threat to the security of the data being transmitted to authorized users. This gives rise to network vulnerabilities such as hacking, eavesdropping, and jamming of the transmitted information. Physical layer security (PLS) has been identified as one of the promising security approaches to safeguard the transmission from eavesdroppers in a wireless network. It is an alternative to the computationally demanding and complex cryptographic algorithms and techniques. PLS has continually received exponential research interest owing to the possibility of exploiting the characteristics of the wireless channel. One of the main characteristics includes the random nature of the transmission channel. The aforesaid nature makes it possible for confidential and authentic signal transmission between the sender and the receiver in the phys...
IEEE Transactions on Information Forensics and Security, 2009
This paper presents both theoretical and practical analyses of the security offered by watermarking and data hiding methods based on spread spectrum. In this context, security is understood as the difficulty of estimating the secret parameters of the embedding function based on the observation of watermarked signals. On the theoretical side, the security is quantified from an information-theoretic point of view by means of the equivocation about the secret parameters. The main results reveal fundamental limits and bounds on security and provide insight into other properties, such as the impact of the embedding parameters, and the tradeoff between robustness and security. On the practical side, workable estimators of the secret parameters are proposed and theoretically analyzed for a variety of scenarios, providing a comparison with previous approaches, and showing that the security of many schemes used in practice can be fairly low.
J. L. López Castro (Ed.) Las ciudades fenicio-púnicas en el Mediterráneo Occidental, CEFYP, Almería, pp. 315-368.
CERN European Organization for Nuclear Research - Zenodo, 2022
Коваленко А. В. Експертне дослідження доказів у кримінальному провадженні. Криміналістика і судова експертиза. Вип. 69. С. 194—207., 2024
The Polish Review, 2015
Science, 2018
Travel medicine and infectious disease, 2017
The Journal of Immunology, 2014
Chemical Physics Letters, 2005
Archivos de Bronconeumología, 2019
Journal of microbiology, biotechnology and food sciences