Article
Computer Science, Hardware & Architecture
Weizheng Wang, Yaoqi Yang, Latif U. Khan, Dusit Niyato, Zhu Han, Mohsen Guizani
Summary: This article provides an overview of security attacks and concerns in a digital twin (DT)-enabled wireless system. It proposes a general framework for future DT-enabled wireless systems and presents two use cases to demonstrate the effectiveness of the framework.
IEEE WIRELESS COMMUNICATIONS
(2023)
Article
Computer Science, Information Systems
Hossein Pirayesh, Huacheng Zeng
Summary: This article surveys existing jamming attacks and anti-jamming strategies in various wireless networks, aiming to provide a comprehensive understanding of the current landscape and stimulate further research efforts to secure wireless networks against jamming attacks.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2022)
Article
Automation & Control Systems
Tengyue Zhang, Hong Wen, Jie Tang, Huanhuan Song, Feiyi Xie
Summary: The cooperative physical layer security scheme enhances communication security for industrial wireless nodes with computing and energy limitations, providing lightweight security for future industrial wireless networks. By utilizing edge computing to select the optimal cooperative node, secrecy for random mobile users in industrial settings is improved.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Engineering, Electrical & Electronic
Yifu Sun, Kang An, Yonggang Zhu, Gan Zheng, Kai-Kit Wong, Symeon Chatzinotas, Haifan Yin, Pengtao Liu
Summary: This paper investigates the effect of the reconfigurable intelligent surface (RIS)-assisted wireless transmitter in improving both spectrum efficiency and security in multi-user cellular networks. By jointly designing the receive decoder, digital precoder, artificial noise (AN), and analog precoder, the paper addresses the worst-case sum rate maximization problem with imperfect angular channel state information (CSI). The proposed alternative optimization (AO) method and low-complexity monotonic optimization algorithm combined with the dual method (MO-dual) provide efficient solutions.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
(2022)
Article
Engineering, Electrical & Electronic
Yifu Sun, Kang An, Junshan Luo, Yonggang Zhu, Gan Zheng, Symeon Chatzinotas
Summary: This paper proposes an intelligent reflecting surface (IRS) assisted secure communication system, which aims to maximize the system achievable rate by jointly designing the BS's transmit beamforming and the IRS's reflect beamforming, while limiting the information leakage to the potential eavesdropper.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Engineering, Electrical & Electronic
Hongliang He, Shanxiang Lyu, Bingwen Feng
Summary: In order to improve the security of information transmission, we propose a cross-time interference injection scheme that enhances security by introducing cross-time self-interference and inter-user interference without the need for artificial noise. This scheme utilizes the properties of Hadamard matrix and wireless channels to create stronger interference on the eavesdropping channel compared to the legitimate channel. We analyze the security performance of this scheme when both the legitimate receiver and the eavesdropper employ successive interference cancellation (SIC) scheme, including secrecy sum rate, secrecy capacity, and secrecy outage probability. We also investigate the impact of the eavesdropper's antenna number, legitimate user number, and time slot utilization on the security performance, obtaining the corresponding relationships for achieving positive secrecy rate. Simulation results validate our theoretical analysis.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2023)
Article
Computer Science, Information Systems
Moslem Forouzesh, Farid Samsami Khodadad, Paeiz Azmi, Ali Kuhestani, Hossein Ahmadi
Summary: This article investigates the security of a simple IoT-based point-to-point communication. It addresses the attacks of overhearing and detecting data communication, and proposes an optimization problem to enhance the security design. The numerical results demonstrate that a more accurate estimation of Willie's location has a more positive impact on the secrecy performance compared to the accuracy of Eves' CSI estimation.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Automation & Control Systems
Ahmet Cetinkaya, Hideaki Ishii, Tomohisa Hayakawa
Summary: This paper investigates jamming attacks on wireless networked control systems in the presence of exogenous disturbance. Specifically, control input packets are assumed to be transmitted over an insecure wireless communication channel from a controller to a remotely located linear plant. The likelihood of transmission failures on this channel varies with time due to the power of the jamming interference signal emitted by an attacker. The paper demonstrates that jamming attacks can compromise system stability under disturbance, even if the system is stable without disturbance. It also presents conditions under which stability can be achieved under jamming and disturbance. The results are illustrated using an example networked control system with a fading wireless channel.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2023)
Article
Telecommunications
Seokhwa Hong, Kyuyeong Kim, Si-Hyeon Lee
Summary: In this paper, a novel machine learning based jamming detection algorithm is proposed, which can classify known attacks used for training and detect unknown attacks not used for training. The algorithm combines simple classification and anomaly detection models, namely decision tree (DT) and isolation forest (IF). An ensemble method is also applied to reduce deviation. The algorithm is evaluated on real datasets and shown to achieve superior performance for both classification and detection tasks under various scenarios.
IEEE COMMUNICATIONS LETTERS
(2023)
Article
Computer Science, Hardware & Architecture
Chenyu Wang, Ding Wang, Yi Tu, Guoai Xu, Huaxiong Wang
Summary: Despite years of research, designing a practical multi-factor user authentication scheme for wireless sensor networks is still challenging due to the security versus efficiency dilemma. Common security failures include smart card loss attacks and node capture attacks, with the latter receiving less attention compared to the former. This article systematically explores node capture attacks, providing insights for secure user authentication scheme design in WSNs.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Information Systems
Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Long Jiao, Kai Zeng
Summary: This study introduces an online learning policy named J-CAP for sensors in wireless cyber-physical systems to dynamically select transmission channels and power, achieving defense against attackers without prior knowledge. J-CAP jointly optimizes sensor's channel selection and power consumption to ensure estimator stability, with a sublinear learning regret bound.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Chemistry, Analytical
Iqra Asghar, Muhammad Ayaz Khan, Tahir Ahmad, Subhan Ullah, Khwaja Mansoor ul Hassan, Attaullah Buriro
Summary: In smart home environments, robust user authentication is necessary due to the interaction between a remote user and devices occurring through a gateway. Existing user-authentication schemes still have security vulnerabilities, including the node capture attack. This research paper analyzes the vulnerability of user-authentication approaches to node capture attacks and proposes a secure scheme suitable for IoT-based smart home environments, validated through verification and performance analysis.
Article
Computer Science, Hardware & Architecture
Qiao Hu, Yuanzhen Liu, Anjia Yang, Gerhard P. Hancke
Summary: This paper investigates the security issues of short-range communication using audio channels and finds that basic overshadowing attacks are possible. The authors propose a novel physical-layer solution to effectively detect overshadowing attacks and enhance the security of acoustic self-jamming systems.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2021)
Article
Computer Science, Theory & Methods
Hongliang He, Xizhao Luo, Jian Weng, Kaimin Wei
Summary: This paper proposes a novel cooperative jamming scheme to improve security in multiple access wiretap channels, where users use their own CSI to design artificial noise to eliminate eavesdroppers' ability to intercept legitimate information. The interference between users plays a key role in achieving security by ensuring that artificial noise from different users helps each other. The study considers both non-collusion and collusion scenarios of eavesdroppers, and shows that positive secrecy sum-rate can be achieved by the proposed scheme.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2021)
Article
Automation & Control Systems
Songlin Chen, Zhibo Pang, Hong Wen, Kan Yu, Tengyue Zhang, Yueming Lu
Summary: The article proposes a scheme using channel-based machine learning to detect clone and Sybil attacks, by exploring channel responses between sensor peers for unique fingerprints, providing accurate authentication rates, and achieving success in industrial environments without manual labeling.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Information Systems
Jun Han, Shijia Pan, Manal Kumar Sinha, Hae Young Noh, Pei Zhang, Patrick Tague
ACM TRANSACTIONS ON SENSOR NETWORKS
(2018)
Article
Engineering, Electrical & Electronic
Madhumitha Harishankar, Sireesha Pilaka, Pragya Sharma, Nagarjun Srinivasan, Carlee Joe-Wong, Patrick Tague
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
(2019)
Proceedings Paper
Computer Science, Information Systems
Dimitrios-Georgios Akestoridis, Vyas Sekar, Patrick Tague
Summary: The Thread networking protocol, a low-power wireless mesh networking protocol based on IPv6, is expected to be widely used in smart home devices. However, its security has been less analyzed compared to other similar protocols. In this study, we analyzed the security of Thread networks using existing hardware and software tools, and studied their susceptibility to energy depletion attacks and online password guessing attacks.
PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22)
(2022)
Proceedings Paper
Computer Science, Information Systems
Madhumitha Harishankar, Jinhang Zuo, Sriram Venkateswaran Iyer, Patrick Tague, Carlee Joe-Wong
Summary: The paper discusses the issue of contract-less connectivity between end-devices and access points/networks, highlighting the potential use of distributed ledger technologies for trustlessly enforcing service and payment exchanges, as well as the application of blockchain technology for authentication in networks.
2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS)
(2021)
Proceedings Paper
Computer Science, Artificial Intelligence
Brian Ricks, Patrick Tague, Bhavani Thuraisingham
Summary: DDoS attacks have evolved into a tool of deceit, while detecting underlying attacks during a DDoS attack is challenging; utilizing flow segmentation and concurrent flow feature aggregation can greatly reduce detection times for both DDoS and underlying attacks, showing promising detection performance.
2021 THIRD IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2021)
(2021)
Proceedings Paper
Computer Science, Information Systems
Sara Beatriz Schwarz, Dimitrios-Georgios Akestoridis, Patrick Tague, Hanan Hibshi
Summary: The Internet of Things presents increasing challenges in security, leading us to propose a method for obfuscating network topology in IEEE 802.15.4 networks to degrade potential attackers' reconnaissance capabilities, despite the trade-off of increased overhead during the association process.
2021 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS)
(2021)
Proceedings Paper
Computer Science, Information Systems
Dimitrios-Georgios Akestoridis, Patrick Tague
Summary: Zigbee networks are widely used in smart environments, but there is a lack of open-source software tools for monitoring network security, leaving networks vulnerable to attacks. This study introduces a distributed system called HiveGuard for monitoring the security of Zigbee networks and tests an energy depletion attack against battery-powered Zigbee devices.
2021 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS)
(2021)
Proceedings Paper
Computer Science, Hardware & Architecture
Christopher Hensler, Patrick Tague
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19)
(2019)
Proceedings Paper
Computer Science, Information Systems
Jianfeng Chi, Emmanuel Owusu, Xuwang Yin, Tong Yu, William Chan, Yiming Liu, Haodong Liu, Jiasen Chen, Swee Sim, Vibha Iyengar, Patrick Tague, Yuan Tian
2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC)
(2018)
Proceedings Paper
Computer Science, Software Engineering
Brian Ricks, Bhavani Thuraisingham, Patrick Tague
2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI)
(2018)
Proceedings Paper
Computer Science, Information Systems
Brian Ricks, Patrick Tague, Bhavani Thuraisingham
2018 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI)
(2018)
Proceedings Paper
Computer Science, Software Engineering
Yuan Tian, Nan Zhang, Yueh-Hsun Lin, XiaoFeng Wang, Blase Ur, XianZheng Guo, Patrick Tague
PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17)
(2017)
Proceedings Paper
Computer Science, Artificial Intelligence
Jun Han, Albert Jin Chung, Patrick Tague
2017 16TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN)
(2017)
Article
Computer Science, Information Systems
Xinlei Chen, Aveek Purohit, Shijia Pan, Carlos Ruiz, Jun Han, Zheng Sun, Frank Mokaya, Patric Tague, Pei Zhang
ACM TRANSACTIONS ON SENSOR NETWORKS
(2017)
Proceedings Paper
Computer Science, Interdisciplinary Applications
Jun Han, Shijia Pan, Manal Kumar Sinha, Hae Young Noh, Pei Zhang, Patrick Tague
BUILDSYS'17: PROCEEDINGS OF THE 4TH ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS
(2017)