Together We are Strong: Securing Industrial Wireless Networks with Overhearing Nodes

被引:0
|
作者
Henningsen, Sebastian [1 ]
Mann, Lucas [1 ]
Dietzel, Stefan [1 ]
Scheuermann, Bjoern [1 ]
机构
[1] Humboldt Univ, Berlin, Germany
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent works have shown that the wireless link between two nodes is neither a shared secret nor unforgeable by an adversary - questioning the effectiveness of many physical layer security mechanisms. In this work, we argue that physical layer security is still valuable when multiple nodes combine their measurements of overheard adversarial transmissions. This assumption is applicable to, e.g., industrial wireless networks, where nodes are spatially close and wireless links are unique. First, we design a novel physical layer adversary detection algorithm particularly suited for the scenario of multiple sensing nodes. Second, we evaluate our algorithm with real-world measurements, which show that already four detecting nodes are sufficient to significantly increase the detection performance.
引用
收藏
页码:259 / 262
页数:4
相关论文
共 50 条
  • [31] A Topology Control Algorithm for Wireless Sensor Networks that considers Overhearing
    Assis Silva, Flavio M.
    Telemaco Neto, Ulisses
    ISADS 2009: 2009 INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2009, : 375 - 380
  • [32] Adaptive Power Control with Overhearing Avoidance for Wireless Sensor Networks
    Ramakrishnan, Maharajan
    Ranjan, P. Vanaja
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2010, 10 (03) : 84 - 91
  • [33] Performance Analysis of Network Coding With Virtual Overhearing in Wireless Networks
    Xie, Ling Fu
    Chong, Peter Han Joo
    Guan, Yong Liang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (05) : 2051 - 2061
  • [34] Reducing Feedback Overhead in Opportunistic Scheduling of Wireless Networks Exploiting Overhearing
    Baek, Seung Jun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (02): : 593 - 609
  • [35] Securing Software Defined Wireless Networks
    He, Daojing
    Chan, Sammy
    Guizani, Mohsen
    IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (01) : 20 - 25
  • [36] Securing the Backpressure Algorithm for Wireless Networks
    Lu, Zhuo
    Sagduyu, Yalin E.
    Li, Jason H.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (04) : 1136 - 1148
  • [37] SECURING UNDERWATER WIRELESS COMMUNICATION NETWORKS
    Carmen Domingo, Mari
    IEEE WIRELESS COMMUNICATIONS, 2011, 18 (01) : 22 - 28
  • [38] SECURING WIRELESS SENSOR NETWORKS: A SURVEY
    Zhou, Yun
    Fang, Yuguang
    Zhang, Yanchao
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (03): : 6 - 28
  • [39] Securing wireless networks in a university environment
    Eisinger, J
    Winterer, P
    Becker, B
    Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 312 - 316
  • [40] Multihop Latency Model for Industrial Wireless Sensor Networks Based on Interfering Nodes
    Vera-Perez, Jose
    Silvestre-Blanes, Javier
    Sempere-Paya, Victor
    Cuesta-Frau, David
    APPLIED SCIENCES-BASEL, 2021, 11 (19):