Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 3 de 3
Filtrar
Más filtros










Base de datos
Intervalo de año de publicación
1.
Sensors (Basel) ; 22(3)2022 Jan 24.
Artículo en Inglés | MEDLINE | ID: mdl-35161611

RESUMEN

Threats of eavesdropping and information leakages have increased sharply owing to advancements in wireless communication technology. In particular, the Internet of Things (IoT) has become vulnerable to sniffing or jamming attacks because broadcast communication is usually conducted in open-network environments. Although improved security protocols have been proposed to overcome the limitations of wireless-communication technology and to secure safe communication channels, they are difficult to apply to mobile communication networks and IoT because complex hardware is required. Hence, a novel security model with a lighter weight and greater mobility is needed. In this paper, we propose a security model applying cooperative friendly jamming using artificial noise and drone mobility, which are autonomous moving objects, and we demonstrate the prevention of eavesdropping and improved security through simulations and field tests. The Cooperative Friendly Jamming Techniques for Drone-based Mobile Secure Zone (CFJ-DMZ) can set a secure zone in a target area to support a safe wireless mobile communication network through friendly jamming, which can effectively reduce eavesdropping threats. According to the experimental results, the average information leakage rate of the eavesdroppers in CFJ-DMZ-applied scenarios was less than or equal to 3%, an average improvement of 92% over conventional methods.

2.
Sensors (Basel) ; 22(2)2022 Jan 12.
Artículo en Inglés | MEDLINE | ID: mdl-35062539

RESUMEN

Considering the increasing scale and severity of damage from recent cybersecurity incidents, the need for fundamental solutions to external security threats has increased. Hence, network separation technology has been designed to stop the leakage of information by separating business computing networks from the Internet. However, security accidents have been continuously occurring, owing to the degradation of data transmission latency performance between the networks, decreasing the convenience and usability of the work environment. In a conventional centralized network connection concept, a problem occurs because if either usability or security is strengthened, the other is weakened. In this study, we proposed a distributed authentication mechanism for secure network connectivity (DAM4SNC) technology in a distributed network environment that requires security and latency performance simultaneously to overcome the trade-off limitations of existing technology. By communicating with separated networks based on the authentication between distributed nodes, the inefficiency of conventional centralized network connection solutions is overcome. Moreover, the security is enhanced through periodic authentication of the distributed nodes and differentiation of the certification levels. As a result of the experiment, the relative efficiency of the proposed scheme (REP) was about 420% or more in all cases.


Asunto(s)
Seguridad Computacional , Confidencialidad , Tecnología
3.
Sensors (Basel) ; 20(7)2020 Apr 05.
Artículo en Inglés | MEDLINE | ID: mdl-32260577

RESUMEN

Wi-Fi technology connects sensor-based things that operate with small batteries, and allows them to access the Internet from anywhere at any time and perform networking. It has become a critical element in many areas of daily life and industry, including smart homes, smart factories, smart grids, and smart cities. The Wi-Fi-based Internet of things is gradually expanding its range of uses from new industries to areas that are intimately connected to people's lives, safety, and property. Wi-Fi technology has undergone a 20-year standardization process and continues to evolve to improve transmission speeds and service quality. Simultaneously, it has also been strengthening power-saving technology and security technology to improve energy efficiency and security while maintaining backward compatibility with past standards. This study analyzed the security vulnerabilities of the Wi-Fi power-saving mechanism used in smart devices and experimentally proved the feasibility of a battery draining attack (BDA) on commercial smartphones. The results of the experiment showed that when a battery draining attack was performed on power-saving Wi-Fi, 14 times the amount of energy was consumed compared with when a battery draining attack was not performed. This study analyzed the security vulnerabilities of the power-saving mechanism and discusses countermeasures.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA
...