Overcoming Wifi Jamming and other security challenges at the Edge
-
I. Stojmenovic, S. Wen, The fog computing paradigm: Scenarios and security issues, in 2014 Federated Conference on Computer Science and Information Systems (FedCSIS) ( IEEE , 2014 ) , pp . 1−8
Google Scholar
-
A. Alrawais , a. Alhothaily , C. Hu , X. Cheng , Fog computing for the internet of thing : security and privacy issue . IEEE Internet Comput .21(2), 34–42 (2017)
article
Google Scholar
-
M. Mukherjee, R. Matam, L. Shu, L. Maglaras, M.A. Ferrag, N. Choudhury, et al., Security and privacy in fog computing: Challenges. IEEE Access 5, 19293–19304 (2017)
article
Google Scholar
-
International Telecommunications Union Recommendation ITU-R V.431-8, Nomenclature of the frequency and wavelength bands used in telecommunications (2015) Accessible on the web at https://www.itu.int/dms_pubrec/itu-r/rec/v/R-REC-V.431-8-201508-I!!PDF-E.pdf
-
D.L. Sengupta, V.V. Liepa, apply electromagnetic and electromagnetic compatibility ( Wiley , Hoboken , 2005 ) , p. 467 . ISBN 0 – 471 – 16549 – 2
Book
Google Scholar
-
Flexera State of the Cloud 2020 Report, available on the web at: https://info.flexera.com/SLO- CM-REPORT-State-of-the-Cloud-2020
-
Gillan, C.J. Fusco, V.F. Optimizing FDTD electromagnetic field computation on distributed networks”, Int. J. Numer. Modell. Electron. Networks Devices Fields, 11, 6, pp. 277-287. https://doi.org/10.1002/(SICI)1099-1204(199811/12)11:6<277::AID- JNM312>3.0.CO;2-O.
Google Scholar
-
UK OFCOM, Frequency bands designated for Industrial, Scientific and Medical use (ISM), available on the web at: https://www.ofcom.org.uk/__data/assets/pdf_file/0022/103297/fat-ism-frequencies.pdf.
-
S. Weinstein , P. Ebert , Data transmission by frequency – division multiplexing using the discrete fourier transform . IEEE Trans . Commun . Technol .19(5), 628–634 (1971). https://doi.org/10.1109/TCOM.1971.1090705
article
Google Scholar
-
ITU-R WRS-12 Terrestrial Workshop, APPENDIX 1 (REV.WRC-12) Classification of emissions and necessary bandwidths, available on the web at: https://www.itu.int/en/ITU- R/terrestrial/workshops/wrs12/Miscellaneous/Appendix1.pdf.
-
R. Bhojani, R. Joshi, An integrated approach for jammer detection using software defined radio, in 7th International Conference On Communication, Computing And Virtualization, Procedia Computer Science, vol. 79, (2016), pp. 809 – 816. https://doi.org/10.1016/j.procs.2016.03.113.
-
J.G. Proakis, D.K. Manolakis “Digital Signal Processing”, Pearson New International Edition, 4/E, Pearson , ISBN-10 : 1292025735 , isbn-13 : 9781292025735 .
Google Scholar
-
G. Romero , V. Deniau , E.P. Simon , Mitigation technique to reduce the Wi – Fi Susceptibility to Jamming Signals , in2018 2nd URSI Atlantic Radio Science Meeting ( AT – RASC ), (Meloneras, 2018), pp. 1–3. https://doi.org/10.23919/URSI-AT-RASC.2018.8471439
chapter
Google Scholar
-
N. Sufyan, N.A. Saqib, M. Zia, Detection of jamming attacks in 802.11b wireless networks. J Wireless Com Network 2013 208, 2013. https://doi.org/10.1186/1687-1499-2013-208
-
A. Grant, P. Williams, N. Ward, S. Basker, GPS jamming and the impact on maritime navigation. J. Navig . 62(2), 173–187 (2009)
article
Google Scholar
-
K. Pelechrinis , M. Iliofotou , S.V. Krishnamurthy , denial of service attack in wireless network : the case of jammer .IEEE Commun. Surv. Tutorials 13( 3 ) , 245–257 ( 2011 )
article
Google Scholar
-
K. Pelechrinis is hopping , C. Koufogiannakis , S.V. Krishnamurthy , On the efficacy of frequency hop in cope with jamming attack in 802.11 network .IEEE Trans. Wirel. Commun. 9(10), 3258–3271 (2010)
article
Google Scholar
-
H. Huang, N. Ahmed, P. Karthik, On a new type of denial of service attack in wireless networks: the distributed jammer network. IEEE Trans. Wirel. Commun. 10(7), 2316–2324 (2011). https://doi.org/10.1109/TWC.2011.052311.101613
article
Google Scholar
-
B. Otis , Y.H. Chee , R. Lu , N.M. Pletcher , J. M. Rabaey An ultralow power MEMS – base two – channel transceiver for wireless sensor network .Proc. IEEE Symp. VLSI Circuits ( 2004 )
Google Scholar
-
E. Altman , K. Avrachenkov , A. Garnaev , jamming in wireless network : The case of several jammer , in2009 International Conference on Game Theory for Network (Istanbul, 2009), pp. 585−592, https://doi.org/10.1109/GAMENETS.2009.5137448
-
W. Xu, W. Trappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, in Proceedings of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing (MobiHoc 2005), ( New York , 2005 ) , pp . 46–57
Google Scholar
-
K. Grover , A. Lim , Q. Yang , jamming and anti – jamming technique in wireless network : a survey . Int . J. Ad Hoc Ubiquitous Comput . ( 2014 ) . https://doi.org/10.1504/IJAHUC.2014.066419
-
R. Maheswari , S. Rajeswari , A review on type of jam attack in mobile ad – hoc network , inProceedings of the UGC Sponsored National Conference on Advanced Networking and Applications, ( 2015 )
Google Scholar
-
FCC public notice 202/418-0500, January 27, 2015 Enforcement Advisory No. 2015-01
Google Scholar
-
available on the web at https://www.accenture.com/us-en/insights/security/cost-cybercrime- study .
-
Available on the web at https://www.forbes.com/sites/marcwebertobias/2015/01/29/this- popular-wireless-alarm-system-can-be-hacked-with-a-magnet-and-scotch-tape/#6b466ec450de
-
J.R. Tong , R.J. Watson , C.N.V. Mitchell , Singel – receiver sentinel to interference gps . world22(7), 38–40 (2011)
Google Scholar
-
C. Curry, K. Czaplewski, C. Chue, A. Weintrit, The use of the eLoran system for transmission of the national time signal, in Marine Navigation, (Taylor and Francis Group, London, 2017), pp. 15–26. https://doi.org/10.1201/9781315099132. ISBN 978 -131- 5099132
chapter
Google Scholar
-
Curry C, Detecting GPS Jammers “Gone in 20 Seconds” Update on UK Research into the GPS Jamming Threat, CGSIC Annual Conference 8th September 2014. Available on the web at https://www.gps.gov/cgsic/meetings/2014/curry.pdf
-
available on the web at http://www.sekotech.com/gsm-3g-4g-jammer-detector/st-171-gsm-3g- 4g-gps-jammer-detector.html
-
Available on the web at http://www.pki-electronic.com/products/jamming-systems/jammer- detector/ (SEKOTECH, PKI)
-
P. Nikolaou, Y. Sazeides, A. Lampropoulos, D. Guilhot, A. Bartoli, G. Papadimitriou, A. Chatzidimitriou, D. Gizopoulos, K. Tovletoglou, L. Mukhanov, G. Karakonstantis, On the evaluation of the total-cost-of-ownership trade-offs in edge vs cloud deployments: a wireless- denial-of-service case study. IEEE Trans. Sustain. Comput. (2019) https://doi.org/10.1109/TSUSC.2019.2894018.
-
P. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other Systems, in advance in Cryptology ( CRYPTO ’ 96 ) . Lecture Notes in Computer Science, vol . 1109 , ( Springer , 1996 ) , pp . 104–113
chapter
Google Scholar
-
D. Bernstein, Cache-timing attacks on AES, (2005)
Google Scholar
-
D. Page, Theoretical use of cache memory as a cryptanalytic side-channel. IACR Cryptology ePrint Archive (2002)
Google Scholar
-
Y. Tsunoo , T. Saito , T. Suzaki , M. Shigeri , H. Miyauci , Cryptanalysis of DES implement on computer with cache , inCryptographic Hardware and Embedded Systems-CHES 2003, (2003)
Google Scholar
-
E. Tromer, D. Osvik, A. Shamir, Efficient cache attacks on AES, and countermeasures. J. Cryptol 23( 1 ) , 37–71 ( 2010 )
Article
MathSciNetGoogle Scholar
-
J Tan, S Jiao, M Chabbi, X Liu, What every scientific programmer should know about compiler optimizations?, in ICS ‘20: Proceedings of the 34th ACM International Conference on Supercomputing, Article No. 42, Pages 1–12 (2020, June), https://doi.org/10.1145/3392717.3392754
-
P. Kocher, J. Jaffe, B. Jun, Differential power analysis method and apparatus, in U.S. Patent 7,587,044, (2009)
Google Scholar
-
NaCl: Networking and Cryptography Library. Available from: https://nacl.cy.yp.to
-
arm : ARMv8 Instruction Set Overview 2011 . available from : https://www.element14.com/community .
-
J.J. Quisquater , D. Samyde , ElectroMagnetic Analysis ( EMA ): Measures and counter- measure for smart card , ” inSmart Card Programming and Security (E-smart 2001). Lecture Notes in Computer Science, Vol . 2140 , pp . 200−210 , ( 2001 )
Google Scholar
-
R. Qiao, M. Seaborn, A new approach for rowhammer attacks,” in Hardware Oriented Security and Trust (HOST), 2016 IEEE International Symposium on Hardware Oriented Security, pp. 161−166, (2016).
Google Scholar
-
O. Mutlu, J.S. Kim, RowHammer: A retrospective. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39, 1555–1571 (2020)
article
Google Scholar
-
M. Lipp, A. Kogler, D. Oswald, M. Schwarz, C. Easdon, C. Canella, D. Gruss, With great power comes great leakage: software-based power side-channel attacks on x86 (2020), available on the web at: https://scholar.google.com/citations?user=gd0o3ngAAAAJ&hl=en
-
K. Tiri, M. Akmal, I. Verbauwhede, A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards, in Solid- State Circuits Conference (ESSCIRC 2002). Proceedings of the 28th European, (2002)
Google Scholar
-
D. Agrawal, B. Archambeault, J.R. Rao, P. Roha, The EM Side-Channel(s), in Cryptographic Hardware and Embedded Systems (CHES). Lecture Notes in Computer Science, vol. 2523, (2002), pp. 29–45
Google Scholar
© Copyright notes
The copyright of the article belongs to the author, please do not reprint without permission.
Related posts
No comments...