Next Generation Wireless Network Security and Privacy - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

11
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781466686878, 9781466686885

Author(s):  
Piyush Kumar Shukla ◽  
Kirti Raj Bhatele

Wireless Networks are vulnerable in nature, mainly due to the behavior of node communicating through it. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operation. In this chapter, we analyze the security problems in MANET. On the prevention side, various key and trust management schemes have been developed to prevent external attacks from outsiders. Both prevention and detection method will work together to address the security concern in MANET.


Author(s):  
Katyayani Kashayp ◽  
Kandarpa Kumar Sarma ◽  
Manash Pratim Sarma

Spread spectrum modulation (SSM) finds important place in wireless communication primarily due to its application in Code Division Multiple Access (CDMA) and its effectiveness in channels fill with noise like signals. One of the critical issues in such modulation is the generation of spreading sequence. This chapter presents a design of chaotic spreading sequence for application in a Direct Sequence Spread Spectrum (DS SS) system configured for a faded wireless channel. Enhancing the security of data transmission is a prime issue which can better be addressed with a chaotic sequence. Generation and application of chaotic sequence is done and a comparison with Gold sequence is presented which clearly indicates achieving better performance with simplicity of design. Again a multiplierless logistic map sequence is generated for lower power requirements than the existing one. The primary blocks of the system are implemented using Verilog and the performances noted. Experimental results show that the proposed system is an efficient sequence generator suitable for wideband systems demonstrating lower BER levels, computational time and power requirements compared to traditional LFSR based approaches.


Author(s):  
G. R. Kanagachidambaresan

Wireless Body Sensor Network is a collection of physiological sensors connected to small embedded machines and transceivers to form a monitoring scheme for patients and elderly people. Intrusion and foolproof routing has become mandatory as the Wireless Body Sensor Network has extended its working range. Trust in Wireless Body Sensor Network is greatly determined by the Encryption key size and Energy of the Node. The Sensor Nodes in Wireless Body Sensor Network is powered by small battery banks which are to be removed and recharged often in some cases. Attack to the implanted node in Wireless Body Sensor Network could harm the patient. Finite State Machine helps in realizing the Trust architecture of the Wireless Body Sensor Network. Markov model helps in predicting the state transition from one state to other. This chapter proposes a Trustworthy architecture for creating a trusted and confidential communication for Wireless Body Sensor Network.


Author(s):  
Piyush Kumar Shukla ◽  
Lokesh Sharma ◽  
Kirti Raj Bhatele ◽  
Poonam Sharma ◽  
Prashant Shukla

Wireless Sensor Networks (WSNs) provide a new paradigm for sensing and disseminating information from various environments, with the potential to serve many and diverse applications. In this chapter, we report the latest trends in WSN research, focusing on middleware technology and related areas, and including application design principles. We give an overview of WSNs and design aspects of applications, including existing research prototypes and industry applications. We describe the technology supporting these sensor applications from the view of system architecture and network communication. We then highlight outstanding issues and conclude with future perspectives on middleware technology.


Author(s):  
Homero Toral-Cruz ◽  
Faouzi Hidoussi ◽  
Djallel Eddine Boubiche ◽  
Romeli Barbosa ◽  
Miroslav Voznak ◽  
...  

Wireless sensor networks (WSN) have become one of the most attractive research areas in many scientific fields for the last years. WSN consists of several sensor nodes that collect data in inaccessible areas and send them to the base station (BS) or sink. At the same time sensor networks have some special characteristics compared to traditional networks, which make it hard to deal with such kind of networks. The architecture of protocol stack used by the base station and sensor nodes, integrates power and routing awareness (i.e., energy-aware routing), integrates data with networking protocols (i.e., data aggregation), communicates power efficiently through the wireless medium, and promotes cooperative efforts of sensor nodes (i.e., task management plane).


Author(s):  
S. P. Anandaraj ◽  
S. Poornima

A typical WSN contains spatially distributed sensors that can cooperatively monitor the environment conditions, like second, temperature, pressure, motion, vibration, pollution and so forth. WSN applications have been used in several important areas, such as health care, military, critical infrastructure monitoring, environment monitoring, and manufacturing. At the same time. WSN Have some issues like memory, energy, computation, communication, and scalability, efficient management. So, there is a need for a powerful and scalable high-performance computing and massive storage infrastructure for real-time processing and storing the WSN data as well as analysis (online and offline) of the processed information to extract events of interest. In this scenario, cloud computing is becoming a promising technology to provide a flexible stack of massive computing, storage, and software services in ascalable and virtualized manner at low cost. Therefore, sensor-cloud (i.e. an integrated version of WSN & cloud computing) infrastructure is becoming popular nowadays that can provide an open flexible, and reconfigurable platform for several monitoring and controlling applications.


Author(s):  
Deshraj Ahirwar ◽  
P. K. Shukla ◽  
Kirti Raj Bhatele ◽  
Prashant Shukla ◽  
Sachin Goyal

Organizations focuses IDPSes for respective purposes, e.g. identifying problems with security strategies, manually presented threats and deterring individuals from violating security policies. IDPSes have become a necessary technique to the security infrastructure of approximate each association. IDPSes typical record information interrelated to practical events, security administrators of essential observed events and construct write up. Many IDPSes can also respond to a detected threat by attempting to thwart it succeeding. These use several response techniques, which involve the IDPS restricting the attack, changing the security environment or the attack's content. Sensor node should diverge in size from a shoebox down to the small size, although functioning “motes” of genuine microscopic dimensions have to be formed. The cost of sensor nodes is variable, from a few to thousands of dollars, depend on the complexity of the sensor nodes. Size and cost constraints on sensor nodes represent in corresponding constraints on resources such as energy, memory, computational velocity and communications bandwidth. The arrangement of the WSNs alters itself from a star network to efficient multi-hop wireless mesh network. The proliferation technique between the hops of the network can be routing or flooding.


Author(s):  
Diego Fernández Alonso ◽  
Ana Vázquez Alejos ◽  
Manuel García Sánchez

A study and identification of vulnerabilities during the set-up procedure of the Universal Mobile Telecommunication System (UMTS) and how some of them can be exploited. For accomplishment a good understanding of the security messages exchange, a part of UMTS architecture is developed firstly. After the explanation of the security mode set-up procedure debilities, the chapter identify attacks that take advantage of the fact that some messages during their exchange in the process are not protected. The attacks indicated in the chapter are mostly of Denial of Service (DoS) kind, and mainly are performed with a rogue BTS.


Author(s):  
G. C. Manna ◽  
Vishnu Suryavanshi

Next generation Network has been evolved based on the concept of integration of voice, data and mobile networks, single point control for provisioning of all services and single account for all services of an user or corporate over an all IP platform. User authentication of next generation network depends on Session Initiation Protocol but existing networks do not directly support this protocol. The new networks authentication policy together with existing networks authentication policy completes the authentication process. Authentication steps for each type of network with trace routes involving associated protocols has been discussed in the chapter.


Author(s):  
Vishnu Suryavanshi ◽  
G. C. Manna

At present a majority of computer and telecommunication systems requires data security when data is transmitted the over next generation network. Data that is transient over an unsecured Next Generation wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user's information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography algorithm provides a solution towards absolute communication security over the next generation network by encoding information as polarized photons, which can be sent through the air security issues and services using cryptographic algorithm explained in this chapter.


Sign in / Sign up

Export Citation Format

Share Document