Together We are Strong: Securing Industrial Wireless Networks with Overhearing Nodes

被引:0
|
作者
Henningsen, Sebastian [1 ]
Mann, Lucas [1 ]
Dietzel, Stefan [1 ]
Scheuermann, Bjoern [1 ]
机构
[1] Humboldt Univ, Berlin, Germany
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent works have shown that the wireless link between two nodes is neither a shared secret nor unforgeable by an adversary - questioning the effectiveness of many physical layer security mechanisms. In this work, we argue that physical layer security is still valuable when multiple nodes combine their measurements of overheard adversarial transmissions. This assumption is applicable to, e.g., industrial wireless networks, where nodes are spatially close and wireless links are unique. First, we design a novel physical layer adversary detection algorithm particularly suited for the scenario of multiple sensing nodes. Second, we evaluate our algorithm with real-world measurements, which show that already four detecting nodes are sufficient to significantly increase the detection performance.
引用
收藏
页码:259 / 262
页数:4
相关论文
共 50 条
  • [21] Can we trust trusted nodes in wireless sensor networks?
    Momani, Mohammad
    Challa, Subhash
    Alhmouz, Rami
    2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3, 2008, : 1227 - +
  • [22] An overhearing based routing scheme for Wireless Sensor Networks
    Sett, Riddhiman
    Banerjee, Indrajit
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2076 - 2082
  • [23] Abstract frames for reducing overhearing in wireless sensor networks
    Bachir, Abdelmalik
    Barthel, Dominique
    Heusse, Martin
    Duda, Andrzej
    NETWORKING 2006: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2006, 3976 : 880 - 891
  • [24] A Novel Approach of Network Coding in Wireless Networks Overhearing
    Ning Zuoting
    Zhang Dafang
    Liu Xuchong
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (06) : 1297 - 1304
  • [25] A Novel Approach of Network Coding in Wireless Networks Overhearing
    NING Zuoting
    ZHANG Dafang
    LIU Xuchong
    Chinese Journal of Electronics, 2018, 27 (06) : 1297 - 1304
  • [26] Only together are we strong
    不详
    ERNAHRUNGS UMSCHAU, 2007, 54 (06): : 330 - 331
  • [27] Securing wireless sensor networks
    Yi, Xun
    Faulkner, Mike
    Okamoto, Eiji
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 497 - +
  • [28] Securing wireless mesh networks
    Glass, Steve
    Portmann, Marius
    Muthukkumarasamy, Vallipuram
    IEEE INTERNET COMPUTING, 2008, 12 (04) : 30 - 36
  • [29] Genetic Algorithm for the Nodes Deployment Problem in Industrial Wireless Sensor Networks
    Rocha-Rocha, David
    Vasquez-Salgado, Francisco
    Duran-Faundez, Cristian
    Medina Duran, Rosa
    Costa, Daniel G.
    Galdames, Patricio
    2018 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION/XXIII CONGRESS OF THE CHILEAN ASSOCIATION OF AUTOMATIC CONTROL (ICA-ACCA), 2018,
  • [30] Algorithm for Estimation of Energy Consumption of Industrial Wireless Sensor Networks Nodes
    Muellner, Ivan
    Winter, Jean M.
    Brusamarello, Valner
    Pereira, Carlos E.
    Netto, Joao C.
    2014 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE (I2MTC) PROCEEDINGS, 2014, : 440 - 444