Explore chapters and articles related to this topic
Network Security for EIS and ECS Systems
Published in Barney L. Capehart, Timothy Middelkoop, Paul J. Allen, David C. Green, Handbook of Web Based Energy Information and Control Systems, 2020
Wireless security can also be improved by making use of the wired equivalent privacy (WEP) protocol. Nearly all IEEE 802.11b-enabled cards and access points on the market implement the WEP standard, which makes it very difficult to use the wireless network without authorization. Since most access points are not protected by WEP, any organization that implements it will discourage all but the most dedicated intruders from gaining access to the network. After enabling WEP, businesses need to change the wireless network’s default SSID to another character string that cannot be readily guessed. SSID broadcasting should also be disabled so that the SSID is not easily intercepted. At the hardware level, any wireless network should include or at least be contained within a network that has firewall and VPN capability.
Content Security in WiMAX Networks
Published in Amitabh Kumar, Mobile Broadcasting with WiMAX: Principles, Technology, and Applications, 2014
The wireless networks based on IEEE 802.11 have been known to be open for security threats because of the low level of encryption support used, if at all. As the physical media is open (e.g., at airports or highways), it can be sniffed by using simple programs. This can lead to either passive attacks (eavesdropping, traffic analysis) or active attacks (e.g., message modification, masquerading, or denial of service). Wireless security is generally provided by using a wired equivalent privacy (WEP) protocol. In this method of security the host and the remote station share a 40-bit symmetric key. The key is semi-permanent and is used only for the duration of connection. The key is used to cipher the data packet payload using the RC4 cipher mechanism. The packets are decrypted at the receiver by using the same cipher key. The key exchange takes place during the initial connection. A special block of data called the initial vector is included in the transmission to maintain data integrity.
Performance Evaluation of Co-Channel Interference on Wireless Networks
Published in Journal of Computer Information Systems, 2022
Joong-Lyul Lee, Joobum Kim, Myungjae Kwak
In recent years, numerous Internet of Things (IoT) devices are being used in our real life due to the development of wireless technology. For example, a smart light bulb, a smart home assistant, a smart wearable device, a smart door lock, a smart TV, a smart refrigerator, a smart vacuum cleaner, etc. are used in a smart home. These numerous IoT devices use the 2.4 GHz or 5 GHz frequency in which is an unlicensed Industrial, Scientific, and Medical (ISM) spectrum under the Federal Communications Commission (FCC). In addition, microwave ovens, cordless phones, Bluetooth devices, wireless security cameras, and ZigBee devices also used the ISM band. The IEEE 802.11 standard use in 2.4 GHz, 5 GHz, and 6 GHz frequency ranges. The Wireless LAN (WLAN) in the 2.4 GHz band provides 11 channels (1–11), each 20 MHz wide. Many of these devices cannot avoid the co-channel interference (CCI) phenomenon caused by using the same frequency and the adjacent channel interference (ACI) phenomenon caused by using adjacent frequencies. Even though it is recommended to use channels 1, 6, and 11 in order to avoid these channel interference phenomena, the interference phenomenon is inevitably experienced due to an increase in the number of IoT devices. Currently, new WLAN technology (IEEE 802.11 ac/ax) have been proposed to avoid these issues. However, this topic is still an ongoing issue as interference represents significant network performance degradation in WLAN, as many devices still use 2.4 GHz. Therefore, in this paper, we compare and analyze the CCI phenomenon with the simulation results in the ns-3 simulator and the real experiment results, and analyze how this phenomenon affects the network performance at the TCP layer.
FPGA implementation of hardware architecture with AES encryptor using sub-pipelined S-box techniques for compact applications
Published in Automatika, 2020
C. Arul Murugan, P. Karthigaikumar, Sridevi Sathya Priya
An efficient scheme for both hardware and software implementation is AES encryption. While compared to software implementation, greater physical security is provided by hardware implementation with higher speed. The applications of wireless security systems, such as military communications and mobile telephony hardware implementation, are very useful in the speed of communication. In the last encryption or decryption process the mix column step and its inverse are not applied. During these steps using four polynomials each column of the state array will be processed. The columns are considered as polynomials over GF (2 8) and multiplied by modulo with a fixed polynomial . The multiplication between the polynomials , and modulo will result in the matrix Matrix can be written in polynomials The designed architecture of 128-bit AES Encryption process is executed on Virtex-4 XC4VLX200. This resulted in speed, area efficiency and lesser hardware requirements on an FPGA. The simulation waveform of substitution transformation and mix column transformation is shown in Figures 10 and 11, respectively. Also, the simulation waveform of 128-bit AES Encryption and Decryption is given in Figure 12 and 13, respectively. The power report of AES is shown in Figure 14 and hardware utilization report executed on Virtex-4 and Spartan 3 is given in Tables 6 and 7, respectively.
Cooperative Secrecy Techniques for Improving Physical Layer Security in NOMA-Based PLC Networks
Published in IETE Technical Review, 2023
Emad S. Hassan, Amir S. Elsafrawey
Like many PLC solutions that originated first for the wireless transmission medium, PLC-based networks can take advantage of several wireless security techniques, especially physical layer security which helps us to maintain security even at the physical layer [5–7]. This paper presents several cooperative secrecy techniques for improving physical layer security in PLC-based networks considering different security constraints. The secrecy performance is measured in terms of two performance metrics: ergodic secrecy capacity (ESC) and secrecy outage probability (SOP) [8,9].