Poster: Potentials of Mixing TSN Wired Networks and Best-Effort Wireless Networks for V2X

Author(s):  
Ion Turcanu ◽  
Christoph Sommer
2018 ◽  
Vol 6 (5) ◽  
pp. 369-376
Author(s):  
Pradeep ◽  
Manjunath

The wireless communication technology gaining importance in extreme conditions in a very effective way due to its benefits. Compared to wired networks, wireless networks have many benefits in terms of flexibility, cost, and mobility. Wireless networks can be easily hacked by the outsiders if there is no proper security. Because of its increasing popularity, wireless networks need proper security measures in addition to the normal protections such as firewalls, virus detectors, etc. Providing the required additional security to the wireless networks is a challenging task. Security can be maintained by providing data authenticity, integrity confidentiality, and authorization. A survey on the security of wireless networks is put forward that discusses various techniques which help in protecting the network and a cryptic secure scheme has been proposed which helps to enhance the security standards in the wireless medium.


Author(s):  
Lawan A. Mohammed ◽  
Biju Issac

This chapter shows that the security challenges posed by the 802.11 wireless networks are manifold and it is therefore important to explore the various vulnerabilities that are present with such networks. Along with other security vulnerabilities, defense against denial of service attacks is a critical component of any security system. Unlike wired networks where denial of service attacks has been extensively studied, there is a lack of research for preventing such attacks in wireless networks. In addition to various vulnerabilities, some factors leading to different types of denial of service (DoS) attacks and some defense mechanisms are discussed in this chapter. This can help to better understand the wireless network vulnerabilities and subsequently more techniques and procedures to combat these attacks may be developed by researchers.


Author(s):  
Dzmitry Kliazovich ◽  
Michael Devetsikiotis ◽  
Fabrizio Granelli

The layering principle has been long identified as a way to increase the interoperability and to improve the design of telecommunication protocols, where each layer offers services to adjacent upper layers and requires functionalities from adjacent lower ones. In the past, layering has enabled fast development of interoperable systems, but at the same time limited the performance of the overall architecture, due to the lack of coordination among layers. This issue is particularly relevant for wireless networks, where the very physical nature of the transmission medium introduces several performance limitations for protocols designed for wired networks. To overcome these limitations, a modification of the layering paradigm has been proposed, namely, cross-layer design, or “cross-layering.” Several cross-layering approaches have been proposed in the literature so far. Nevertheless, little formal characterization of the cross-layer interaction among different levels of the protocol stack is available yet. A clear need exists for identifying approaches able to analyze and provide quantitative guidelines for the design of cross-layer solutions, and, more importantly, to decide, in each case, whether cross-layering represents an effective solution or not. This chapter provides a detailed survey of the state-of-the-art and future directions in the usage of formal methods for cross-layer modeling and optimization of wireless networks. The text starts by detailing the principles of layered (ISO/OSI and TCP/IP) protocol stacks as well as the cross-layer paradigm. An overview of the architectures of existing and perspective wireless networks is presented along with an analysis of the potential limitations deriving from the layering approach and detailed description of possible optimization solutions enabled by cross-layer design. Subsequent sections are devoted to the issues of modeling and optimization of wireless networks. The remaining sections cover performance optimization as well as architecture optimization (specifically in terms of signaling). The chapter ends with a summary and outlines about future directions of research on the topic.


2020 ◽  
Author(s):  
Gustavo Cainelli ◽  
Max Feldman ◽  
Tiago Rodrigo Cruz ◽  
Ivan Muller ◽  
Carlos Eduardo Pereira

The use of industrial wireless networks has been growing continuously and it hasbecome an alternative to wired networks. One of the main elements of an industrial wireless network is the network manager, this component is responsible for tasks related to the network construction and maintenance. This work presents the development of a network manager compatible with the WirelessHART protocol, but also customizable, where it is possible to make modifications in order to carry out studies with this protocol. Case studies are presented where the developed tool was used for studies related to communications scheduling, adaptive channel mapping and fast data collection, thus proving the efficiency of the proposed manager.


2009 ◽  
pp. 188-196
Author(s):  
Hans Lehmann ◽  
Ulrich Remus ◽  
Stefan Berger

More and more people leave their fixed working environment in order to perform their knowledgeintensive tasks at changing locations or while they are on the move. Mobile knowledge workers are often separated from their colleagues, and they have no access to up-to-date knowledge they would have in their offices. Instead, they rely on faxes and messenger services to receive materials from their home bases (Schulte, 1999). In case of time-critical data, this way of communication with their home office is insufficient. Mobile knowledge management (KM) has been introduced to overcome some of the problems knowledge workers are faced when handling knowledge in a mobile work environment (e.g., Berger, 2004; Grimm, Tazari, & Balfanz, 2002,). The main goal of mKM is to provide mobile access to knowledge management systems (KMS) and other information resources, to generate awareness between mobile and stationary workers by linking them to each other, and to realize mobile KM services that support knowledge workers in dealing with their tasks (see chapter, “A Mobile Portal for Academe: The Example of a German University” in the same book). So far, most of the off-the-shelf KMS are intended for the use on stationary desktop PCs or laptops with stable network access, and provide just simple access from mobile devices. As KMS are generally handling a huge amount of information (e.g., documents in various formats, multimedia content, etc.) the limitations of (mobile) information and communication technologies (ICTs), like mobile devices such as PDAs and mobile phones, becomes even more crucial (Hansmann, Merk, Niklous, & Stober, 2001). Mobile devices are usually not equipped with the amount of memory and computational power found in desktop computers; they often provide small displays and limited input capabilities, in comparison to wired networks, wireless networks generally have a lower bandwidth restricting the transfer of large data volumes and due to fading, lost radio coverage, or deficient capacity, wireless networks are often inaccessible for periods of time. Today, many KMS are implemented as knowledge portals, providing a single point of access to many different information and knowledge sources on the desktop together with a bundle of KM services. In order to realize mobile access to knowledge portals, portal components have to be implemented as mobile portlets. That means that they have to be adapted according to technical restrictions of mobile devices and the user’s context. This contribution identifies requirements for mobile knowledge portals. In particular, it reviews the main characteristics of mobile knowledge portals, which are considered to be the main ICT to support mobile KM. In addition, it outlines an important future issue in mobile knowledge portals: The consideration of location-based information in mobile knowledge portals.


Author(s):  
dolfo Alan Sánchez Vázquez ◽  
Gregorio Martínez Pérez

In principle, computers networks were conceived to share resources and certain computing devices among a select group of people working in academic institutions. In this context, the security did not have high importance. Today, through the network circulates a lot of valuable data (budgets, credit card numbers, marketing data, etc.), much of which can be considered confidential. Here is where security takes great importance?so that these data cannot be read or modified by any third party, and the services offered are always available and only to authorized people (confidentiality, integrity, and readiness). When we refer to security, there are some terms of great importance. Risk is defined as any accidental or not prospective exhibition of information as consequence of the bad operation of hardware or the incorrect design of software. Vulnerabilities indicate when a failure in the operation of software and/or hardware elements exposes the system to penetrations. Starting from here we can define attack as an event against the good operation of a system, and it can be successful or not. If the attack is successful and access is obtained to the files and programs or control is obtained to the computers without being detected, then we are dealing with a penetration. This leads to an intrusion, which is a group of actions compromising the integrity, confidentiality, and readiness of computer resources (Sobh, 2006). The main objective of this article is to explain to the reader the main concepts regarding intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), and the particular issues that should be additionally considered when protecting wireless communication scenarios (in comparison with IDSs/IPSs in traditional wired networks). It also includes an extended view of the current state of the art of IDSs and IPSs in wireless networks, covering both research works done so far in this area, as well as an analysis of current open source IDSs and IPSs, and how they are dealing with the specific requirements of wireless communication networks. This article is organized as follows: First, we start with a summary of the main related works in the background section; then we give a description of the important concepts of security, a classification of intrusion detection systems, and a brief comparative of the operation of IDSs in wired and wireless networks. Next, we highlight certain research works exemplifying efforts done so far in wireless scenarios. We present the main ideas behind our current research work to model intrusions in wireless scenarios, before offering future directions of work and a summary of the main ideas expressed in the article.


Author(s):  
Yacine Djemaiel ◽  
Slim Rekhis ◽  
Noureddine Boudriga

Wireless networks are gaining popularity that comes with the occurrence of several networking technologies raising from personal to wide area, from centralized to distributed, and from infrastructure-based to infrastructure-less. Wireless data link characteristics such as openness of transmission media, makes these networks vulnerable to a novel set of security attacks, despite those that they inherit from wired networks. In order to ensure the protection of mobile nodes that are interconnected using wireless protocols and standards, it is essential to provide a depth study of a set of mechanisms and security models. In this chapter, we present the research studies and proposed solutions related to the authentication, privacy, trust establishment, and management in wireless networks. Moreover, we introduce and discuss the major security models used in a wireless environment.


Author(s):  
Amel Meddeb Makhlouf ◽  
Noureddine Boudriga

The broadcast nature of wireless networks and the mobility features created new kinds of intrusions and anomalies taking profit of wireless vulnerabilities. Because of the radio links and the mobile equipment features of wireless networks, wireless intrusions are more complex because they add to the intrusions developed for wired networks, a large spectrum of complex attacks targeting wireless environment. These intrusions include rogue or unauthorized access point (AP), AP MAC spoofing, and wireless denial of service and require adding new techniques and mechanisms to those approaches detecting intrusions targeting wired networks. To face this challenge, some researchers focused on extending the deployed approaches for wired networks while others worked to develop techniques suitable for detecting wireless intrusions. The efforts have mainly addressed: (1) the development of theories to allow reasoning about detection, wireless cooperation, and response to incidents; and (2) the development of wireless intrusion and anomaly detection systems that incorporate wireless detection, preventive mechanisms and tolerance functions. This chapter aims at discussing the major theories, models, and mechanisms developed for the protection of wireless networks/systems against threats, intrusions, and anomalous behaviors. The objectives of this chapter are to: (1) discuss security problems in a wireless environment; (2) present the current research activities; (3) study the important results already developed by researchers; and (4) discuss the validation methods proposed for the protection of wireless networks against attacks.


An ad hoc network typically refers to any set of networks where all devices have equal status on a network and are free to associate with any other ad hoc network device in link range. In particular, ad hoc network often refers to a mode of operation of IEEE 802.11 wireless networks. A wireless ad hoc network is a decentralized type of wireless network. The network is ad hoc because it does not rely on a pre-existing infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. The decentralized nature of wireless ad hoc networks makes them suitable for a variety of applications where central nodes cannot be relied on and may improve the scalability of networks compared to wireless managed networks, though theoretical and practical limits to the overall capacity of such networks have been identified. This chapter explores this.


Sign in / Sign up

Export Citation Format

Share Document