Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 4 de 4
Filtrar
Más filtros

Banco de datos
Tipo de estudio
Tipo del documento
Intervalo de año de publicación
1.
Sensors (Basel) ; 24(16)2024 Aug 08.
Artículo en Inglés | MEDLINE | ID: mdl-39204828

RESUMEN

Wireless local area networks (WLANs) have recently evolved into technologies featuring extremely high throughput and ultra-high reliability. As WLANs are predominantly utilized in Internet of Things (IoT) and Wi-Fi-enabled sensor applications powered by coin cell batteries, these high-efficiency, high-performance technologies often cause significant battery depletion. The introduction of the trigger frame-based uplink transmission method, designed to enhance network throughput, lacks adequate security measures, enabling attackers to manipulate trigger frames. Devices receiving such frames must respond immediately; however, if a device receives a fake trigger frame, it fails to enter sleep mode, continuously sending response signals and thereby increasing power consumption. This problem is specifically acute in next-generation devices that support multi-link operation (MLO), capable of simultaneous transmission and reception across multiple links, rendering them more susceptible to battery draining attacks than conventional single-link devices. To address this, this paper introduces a Secure Triggering Frame-Based Dynamic Power Saving Mechanism (STF-DPSM) specifically designed for multi-link environments. Experimental results indicate that even in a multi-link environment with only two links, the STF-DPSM improves energy efficiency by an average of approximately 55.69% over conventional methods and reduces delay times by an average of approximately 44.7% compared with methods that consistently utilize encryption/decryption and integrity checks.

2.
Sensors (Basel) ; 22(2)2022 Jan 12.
Artículo en Inglés | MEDLINE | ID: mdl-35062539

RESUMEN

Considering the increasing scale and severity of damage from recent cybersecurity incidents, the need for fundamental solutions to external security threats has increased. Hence, network separation technology has been designed to stop the leakage of information by separating business computing networks from the Internet. However, security accidents have been continuously occurring, owing to the degradation of data transmission latency performance between the networks, decreasing the convenience and usability of the work environment. In a conventional centralized network connection concept, a problem occurs because if either usability or security is strengthened, the other is weakened. In this study, we proposed a distributed authentication mechanism for secure network connectivity (DAM4SNC) technology in a distributed network environment that requires security and latency performance simultaneously to overcome the trade-off limitations of existing technology. By communicating with separated networks based on the authentication between distributed nodes, the inefficiency of conventional centralized network connection solutions is overcome. Moreover, the security is enhanced through periodic authentication of the distributed nodes and differentiation of the certification levels. As a result of the experiment, the relative efficiency of the proposed scheme (REP) was about 420% or more in all cases.


Asunto(s)
Seguridad Computacional , Confidencialidad , Tecnología
3.
Sensors (Basel) ; 22(3)2022 Jan 24.
Artículo en Inglés | MEDLINE | ID: mdl-35161611

RESUMEN

Threats of eavesdropping and information leakages have increased sharply owing to advancements in wireless communication technology. In particular, the Internet of Things (IoT) has become vulnerable to sniffing or jamming attacks because broadcast communication is usually conducted in open-network environments. Although improved security protocols have been proposed to overcome the limitations of wireless-communication technology and to secure safe communication channels, they are difficult to apply to mobile communication networks and IoT because complex hardware is required. Hence, a novel security model with a lighter weight and greater mobility is needed. In this paper, we propose a security model applying cooperative friendly jamming using artificial noise and drone mobility, which are autonomous moving objects, and we demonstrate the prevention of eavesdropping and improved security through simulations and field tests. The Cooperative Friendly Jamming Techniques for Drone-based Mobile Secure Zone (CFJ-DMZ) can set a secure zone in a target area to support a safe wireless mobile communication network through friendly jamming, which can effectively reduce eavesdropping threats. According to the experimental results, the average information leakage rate of the eavesdroppers in CFJ-DMZ-applied scenarios was less than or equal to 3%, an average improvement of 92% over conventional methods.

4.
Sensors (Basel) ; 20(7)2020 Apr 05.
Artículo en Inglés | MEDLINE | ID: mdl-32260577

RESUMEN

Wi-Fi technology connects sensor-based things that operate with small batteries, and allows them to access the Internet from anywhere at any time and perform networking. It has become a critical element in many areas of daily life and industry, including smart homes, smart factories, smart grids, and smart cities. The Wi-Fi-based Internet of things is gradually expanding its range of uses from new industries to areas that are intimately connected to people's lives, safety, and property. Wi-Fi technology has undergone a 20-year standardization process and continues to evolve to improve transmission speeds and service quality. Simultaneously, it has also been strengthening power-saving technology and security technology to improve energy efficiency and security while maintaining backward compatibility with past standards. This study analyzed the security vulnerabilities of the Wi-Fi power-saving mechanism used in smart devices and experimentally proved the feasibility of a battery draining attack (BDA) on commercial smartphones. The results of the experiment showed that when a battery draining attack was performed on power-saving Wi-Fi, 14 times the amount of energy was consumed compared with when a battery draining attack was not performed. This study analyzed the security vulnerabilities of the power-saving mechanism and discusses countermeasures.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA