Vogl, 2023 - Google Patents
Development of a security protecting watermarking system using side-channels in LoRaWANVogl, 2023
View PDF- Document ID
- 574891477740308470
- Author
- Vogl L
- Publication year
External Links
Snippet
Low Power Wide Area Networks (LPWANs), like LoRaWAN, aim to wirelessly connect a multitude of sensor nodes in an energy-efficient way. These, also called Wireless Sensor Networks (WSNs), are a building block of the Internet of Things (IoT). The low power aspect …
- 230000018109 developmental process 0 title description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0212—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
- H04W52/0216—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave using a pre-established activity schedule, e.g. traffic indication frame
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC [Transmission power control]
- H04W52/38—TPC being performed in particular situations
- H04W52/44—TPC being performed in particular situations in connection with interruption of transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/26—Explicit feedback to the source, e.g. choke packet
- H04L47/263—Source rate modification after feedback
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xie et al. | Data collection for security measurement in wireless sensor networks: A survey | |
Yang et al. | Security vulnerabilities in LoRaWAN | |
EP3343877B1 (en) | Generating and using ephemeral identifiers and message integrity codes | |
US11245484B2 (en) | Authenticating time sources using attestation-based methods | |
Stelte et al. | Thwarting attacks on ZigBee-Removal of the KillerBee stinger | |
Lim et al. | Security protocols against cyber attacks in the distribution automation system | |
Ozdemir et al. | PRDA: polynomial regression‐based privacy‐preserving data aggregation for wireless sensor networks | |
US11122346B1 (en) | Attestation in optical transport network environments | |
Di Pietro et al. | United we stand: Intrusion resilience in mobile unattended WSNs | |
Naoui et al. | Novel enhanced LoRaWAN framework for smart home remote control security | |
Ye et al. | Detection of spoofing attacks in WLAN-based positioning systems using WiFi hotspot tags | |
Premarathne et al. | Secure and reliable surveillance over cognitive radio sensor networks in smart grid | |
Pietro et al. | Self-healing in unattended wireless sensor networks | |
Staudemeyer et al. | What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net | |
Tedeschi et al. | SpreadMeNot: A provably secure and privacy-preserving contact tracing protocol | |
Faraj et al. | ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks | |
Vogl | Development of a security protecting watermarking system using side-channels in LoRaWAN | |
Carrasco et al. | Securing a wireless sensor network for human tracking: a review of solutions | |
Moura et al. | Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios | |
Chang et al. | Distributed authentication of program integrity verification in wireless sensor networks | |
Kitisriworapan et al. | Evil-twin detection on client-side | |
Malekzadeh et al. | Design and implementation of a lightweight security model to prevent IEEE 802.11 Wireless DoS attacks | |
Papadimitratos et al. | A randomized countermeasure against parasitic adversaries in wireless sensor networks | |
Edwards | Covert channels in ad hoc networking: an analysis using the optimized link state routing protocol | |
Stelte et al. | Concealed Integrity Monitoring for Wireless Sensor Networks |