[go: up one dir, main page]

Vogl, 2023 - Google Patents

Development of a security protecting watermarking system using side-channels in LoRaWAN

Vogl, 2023

View PDF
Document ID
574891477740308470
Author
Vogl L
Publication year

External Links

Snippet

Low Power Wide Area Networks (LPWANs), like LoRaWAN, aim to wirelessly connect a multitude of sensor nodes in an energy-efficient way. These, also called Wireless Sensor Networks (WSNs), are a building block of the Internet of Things (IoT). The low power aspect …
Continue reading at repositum.tuwien.at (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0212Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
    • H04W52/0216Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave using a pre-established activity schedule, e.g. traffic indication frame
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC [Transmission power control]
    • H04W52/38TPC being performed in particular situations
    • H04W52/44TPC being performed in particular situations in connection with interruption of transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • H04L47/10Flow control or congestion control
    • H04L47/26Explicit feedback to the source, e.g. choke packet
    • H04L47/263Source rate modification after feedback

Similar Documents

Publication Publication Date Title
Xie et al. Data collection for security measurement in wireless sensor networks: A survey
Yang et al. Security vulnerabilities in LoRaWAN
EP3343877B1 (en) Generating and using ephemeral identifiers and message integrity codes
US11245484B2 (en) Authenticating time sources using attestation-based methods
Stelte et al. Thwarting attacks on ZigBee-Removal of the KillerBee stinger
Lim et al. Security protocols against cyber attacks in the distribution automation system
Ozdemir et al. PRDA: polynomial regression‐based privacy‐preserving data aggregation for wireless sensor networks
US11122346B1 (en) Attestation in optical transport network environments
Di Pietro et al. United we stand: Intrusion resilience in mobile unattended WSNs
Naoui et al. Novel enhanced LoRaWAN framework for smart home remote control security
Ye et al. Detection of spoofing attacks in WLAN-based positioning systems using WiFi hotspot tags
Premarathne et al. Secure and reliable surveillance over cognitive radio sensor networks in smart grid
Pietro et al. Self-healing in unattended wireless sensor networks
Staudemeyer et al. What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net
Tedeschi et al. SpreadMeNot: A provably secure and privacy-preserving contact tracing protocol
Faraj et al. ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks
Vogl Development of a security protecting watermarking system using side-channels in LoRaWAN
Carrasco et al. Securing a wireless sensor network for human tracking: a review of solutions
Moura et al. Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios
Chang et al. Distributed authentication of program integrity verification in wireless sensor networks
Kitisriworapan et al. Evil-twin detection on client-side
Malekzadeh et al. Design and implementation of a lightweight security model to prevent IEEE 802.11 Wireless DoS attacks
Papadimitratos et al. A randomized countermeasure against parasitic adversaries in wireless sensor networks
Edwards Covert channels in ad hoc networking: an analysis using the optimized link state routing protocol
Stelte et al. Concealed Integrity Monitoring for Wireless Sensor Networks