Security, privacy, and accountability in wireless access networks
The presence of ubiquitous connectivity provided by wireless communications and mobile computing has changed the way humans interact with information. At the same time, it has made communication security and privacy a hot-button issue. In this article we address the security and privacy concerns in wireless access networks. We first discuss the general cryptographic means to design privacy-preserving security protocols, where the dilemma of attaining both security and privacy goals, especially user accountability vs. user privacy, is highlighted. We then present a novel authentication framework that integrates a new key management scheme based on the principle of separation of powers and an adapted construction of Boneh and Shacham's group signature scheme, as an enhanced resort to simultaneously achieve security, privacy, and accountability in wireless access networks.
- Conference Instance
- 10.1145/1280940
- Aug 12, 2007
On behalf of the Technical Program Committee, I welcome you all to the ACM International Wireless Communications and Mobile Computing Conference (ACM IWCMC 2007) in Turtle Bay Resort, Honolulu, Hawaii! I'm delighted that this year's ACM IWCMC accomplishes its goal under our conference theme "The Future is Now---The New Era of Wireless Communications and Mobile Computing and Networking Technologies" and continues its tradition of providing the premier forum for presentation of research results and experience reporting on the cutting edge research in the general areas of the wireless communications and mobile computing. This year, we received about 300 submissions from 32 countries. All papers received rigorous peer reviews from our Technical Program Committee (TPC), comprised of 41 Symposia Chairs/Co-Chairs and a total of 200 TPC members from academia, government laboratories, and industries. We also invited more than 470 external expert reviewers from all over the world. After carefully examining all the received review reports, the ACM IWCMC 2007 TPC finally selected 119 high-quality papers for presentation at the conference and publication in ACM IWCMC 2007 proceedings. The accepted papers come from United Kingdom, Canada, Germany, Australia, Taiwan, Korea, China, India, Japan, Portugal, Finland, Egypt, France, Ireland, Pakistan, Spain, Brazil, Italy, Iran, Norway, Sweden, Chile, Singapore, and the United States. The conference program starts each day with a keynote speaker given by the world-class leaders in the areas -- Dr. Robert E. Kahn, Professor Vijay K. Bhargava, Professor Aggelos K. Katsaggelos, highlighting the latest research trends in the wireless communications, mobile computing, and networks. A total of 27 technical sessions, organized in three parallel tracks, from the core of the technical program. This year, the technical sessions reflect the continued and growing interests in a wide range of spectrum, including wireless communications and networks, cross-layer design and optimization, mobile computing, wireless sensor networks, network security, information theory and applications.
- Conference Article
- 10.1109/iwcmc.2011.5982492
- Jul 1, 2011
On behalf of the Technical Program Committee, we welcome all of you to the IEEE International Wireless Communications and Mobile Computing Conference (IEEE IWCMC 2011) in the beautiful campus of Bahcesehir University, Istanbul, Turkey! We are indeed delighted that this year's IEEE IWCMC accomplishes its goal under the conference theme "Making Wireless Communities," and continues its tradition of providing the premier forum for presentation of research results and experience reporting on the cutting edge research in the general areas of wireless communications and mobile computing. This year, we received more than 1000 submissions from 51 countries worldwide. Each paper received at least three peer technical reviews, comprised of 49 Symposia Chairs/Co-Chairs and a total of more than 450 TPC members from academia, government laboratories, and industries. After carefully examining all the received review reports, the IEEE IWCMC 2011 TPC finally selected about 35% high-quality papers for presentation at the conference and publication in the IEEE IWCMC 2011 proceedings. The conference program starts on Monday July 4 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">th</sup> with a full day Tutorials that is free of charge to all our attendees. Then, each day starts with a keynote speaker chosen from renowned world-class leaders in the area-Dr. Rick Stevens, Dr. Mario Gerla, and Dr. Sajal Das, highlighting the latest research trends in the wireless communications, mobile computing, and networks. This year, the technical sessions reflect the continued and growing interests in a wide range of spectrum, including wireless communications and networks, cross-layer design and optimization, mobile computing, wireless sensor networks, network security, and use of wireless technologies in social emergency applications. We also added a special Workshop this year to address practical aspects of Wireless Communications and Mobile Computing, such as Multihop Wireless Network Testbeds and Experiments, Network and Communications for Advanced Society, and Federated Wireless Sensor Systems (FedSenS). There are five special sessions composed of invited papers from renowned experts from around the world. Outstanding papers will be selected for four Special Issues in well known international journals. Our objective in the future is to reduce the acceptance rate further to reach 30% and less. In addition, we would like to reduce the number of Symposia and Workshops as well to meet the conference theme.
- Dissertation
- 10.31390/gradschool_theses.2930
- Jan 1, 2006
The proliferation of a range of wireless devices, from the cheap low power resource starved sensor nodes to the ubiquitous cell phones and PDA's has resulted in their use in many applications. Due to their inherent broadcast nature Security and Privacy in wireless networks is harder than the wired networks. Along with the traditional security requirements like confidentiality, integrity and non-repudiation new requirements like privacy and anonymity are important in wireless networks. These factors combined with the fact that nodes in a wireless network may have different resource availabilities and trust levels makes security in wireless networks extremely challenging. The functional lifetime of sensor networks in general is longer than the operational lifetime of a single node, due to limited battery power. Therefore to keep the network working multiple deployments of sensor nodes are needed. In this thesis, we analyze the vulnerability of the existing key predistribution schemes arising out of the repeated use of fixed key information through multiple deployments. We also develop SCON, an approach for key management that provides a significant improvement in security using multiple key pools. SCON performs better in a heterogeneous environment. We present a key distribution scheme that allows mobile sensor nodes to connect with stationary nodes of several networks. We develop a key distribution scheme for a semi ad-hoc network of cell phones. This scheme ensures that cell phones are able to communicate securely with each other when the phones are unable to connect to the base station. It is different from the traditional ad hoc networks because the phones were part of a centralized network before the base station ceased to work. This allows efficient distribution of key material making the existing schemes for ad hoc networks ineffective. In this thesis we present a mechanism for implementing authenticated broadcasts which ensure non-repudiation using identity based cryptography. We also develop a reputation based mechanism for the distributed detection and revocation of malicious cell phones. Schemes which use the cell phone for secure spatial authentication have also been presented.
- Single Book
19
- 10.1007/978-0-387-71058-7
- Jan 1, 2007
Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless networks and mobile computing. The material includes a report to the National Science Foundation of the United States which will be used by program managers for the foundation in setting priorities for research directions in this area. In the following chapters field experts expand upon the report and provide further information about important research directions in the fields of wireless networks and mobile computing. The chapters are written by the leading international researchers and professionals in thes fields. Each chapter represents state-of-the-art research and includes several influential contributions. A multitude of valuable discussions on relevant concepts, such as the various approaches that define emerging security and privacy in mobile and wireless environment, are featured. The book is useful to researchers working in the fields of mobile and wireless security and privacy and to graduate students seeking new areas to perform research. It also provides information for academics and industry people researching recent trends and developments in the mobile and wireless security fields.
- Conference Instance
- 10.1145/1815396
- Jun 28, 2010
On behalf of the Technical Program Committee, we welcome you all to the ACM International Wireless Communications and Mobile Computing Conference (ACM IWCMC 2010) held in the Conference Center of the historical city of Caen, France! We are indeed delighted that this year's ACM IWCMC has accomplished its goal under the conference theme "Innovative Communications for a Better Future," and continued its tradition of providing the premier forum for presentation of research results and experience reporting on the cutting edge research in the general areas of the wireless communications and mobile computing. This year, we received more than 650 submissions from 52 countries. Each paper received at least three peer technical reviews from a highly expert TPC, comprised of 41 Symposia Chairs/Co-Chairs and a total of more than 400 TPC members from academia, government laboratories, and industries. After carefully examining all the received review reports, the TPC finally selected about 37% of the highest technical quality papers for presentation at the conference and publication in the ACM IWCMC 2010 proceedings. The conference program starts on Monday with a full day of Tutorials that is free of charge to all attendees. Then, each day starts with a keynote speech given by renowned world-class experts in the area---Dr. Bill Gropp, Dr. Ty Znati, and Dr. Ahmed Helmy, highlighting the latest research trends in the wireless communications, Cyber-Physical Systems, and networked mobile societies. A total of 42 technical sessions, organized in five parallel tracks. This year, the technical sessions reflect the continued and growing interests in a wide range of spectrum, including wireless communications and networks, cross-layer design and optimization, mobile computing, wireless sensor networks, network security, and use of wireless technologies in social emergency applications. There are two special sessions composed of invited papers from renowned experts from around the world and there is an industrial panel session led by industrial experts to discuss "Cognitive Radio research status." Outstanding papers will be selected for a Special Issue in the Wiley Journal of Wireless Communications and Mobile Computing. Our objective in the near future is to reduce the acceptance rate further to reach a range of 30% to 35% (at the most) starting next year.
- Conference Article
- 10.1109/iwcmc.2015.7288921
- Aug 1, 2015
It is a great pleasure welcoming all of you to the IEEE International Wireless Communications and Mobile Computing Conference (IEEE IWCMC 2015) in the beautiful Dubrovnik, Croatia! We are indeed delighted that this year's IEEE IWCMC lived up to its goal under the conference theme “Communications for the 21st Century,” and continues its tradition of providing the premier forum for presentation of research results and experience reporting on the cutting edge research in the general areas of wireless communications and mobile computing. This year, we received more than 700 submissions from 42 countries. Each paper received at least three peer technical reviews, comprised of more than 450 TPC members from academia, government laboratories, and industries. After carefully examining all review reports, the IEEE IWCMC 2015 TPC finally selected about 36% high-quality papers for presentation at the conference and publication in the IEEE IWCMC 2015 proceedings. The conference program starts on Monday August 24th with a full day of Tutorials that are free of charge to all our attendees. Then, each day starts with a keynote speaker chosen from renowned world-class leaders in the area-Dr. Giuseppe Bianchi from University of Roma Tor Vergata, Italy, Dr. Mario Gerla from UCLA, and Dr. Slim Alouini from KAUST, highlighting the latest research trends in the wireless communications, mobile computing, and networks. This year, the technical sessions reflect the continued and growing interests in a wide range of spectrum, including wireless communications and networks, cross-layer design and optimization, mobile computing, wireless sensor networks, network security, and use of wireless technologies in social emergency applications. There are two special sessions composed of invited papers from renowned experts from around the world. Outstanding papers will be selected for four Special Issues in well known international journals. Our objective in the future is to reduce the acceptance rate further.
- Conference Article
- 10.1109/iwcmc.2014.6906316
- Aug 1, 2014
It is a great pleasure to welcome all of you to the IEEE International Wireless Communications and Mobile Computing Conference (IEEE IWCMC 2014) in the beautiful city of Nicosia, Cyprus! We are indeed delighted that this year's IEEE IWCMC accomplishes its goal under the conference theme “Connecting the World,” and continues its tradition of providing the premier forum for presentation of research results and experience reporting on the cutting edge research in the general areas of wireless communications and mobile computing. This year, we received more than 595 submissions from 35 countries. Each paper received at least three peer technical reviews, comprised of more than 500 TPC members from academia, government laboratories, and industries. After carefully examining all review reports, the IEEE IWCMC 2014 TPC finally selected about 34% high-quality papers for presentation at the conference and publication in the IEEE IWCMC 2014 proceedings. The conference program starts on Monday August 4 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">th</sup> with a full day Tutorials that are free of charge to all our attendees. Then, each day starts with a keynote speaker chosen from renowned world-class leaders in the area-Dr. Mario Gerla, Dr. Fumiyuki Adachi, and Dr. Tarik Taleb, highlighting the latest research trends in the wireless communications, mobile computing, and networks. This year, the technical sessions reflect the continued and growing interests in a wide range of spectrum, including wireless communications and networks, cross-layer design and optimization, mobile computing, wireless sensor networks, network security, and use of wireless technologies in social applications. There are two special sessions composed of invited papers from renowned experts from around the world. Outstanding papers will be selected for possible Special Issues in international journals. Our objective in the future is to reduce the acceptance rate and improve the quality of presentations and discussions further.
- Conference Article
3
- 10.1109/pccc.2004.1395170
- Apr 15, 2004
Information assurance techniques employed in wired networks have limited direct applicability in wireless networks because of the unique aspects of wireless networks (e.g., user mobility, wireless communication channel, power conservation, limited computational power in mobile nodes, security at the link layer, etc.). The interaction between the components of information assurance, namely availability and security in a wireless network environment poses new challenges. In this article, we present a framework for understanding survivability and security in wireless network and also discuss the issues related to the interaction between survivability and security in hybrid wireless access networks.
- Conference Article
- 10.1109/iwcmc.2013.6583518
- Jul 1, 2013
We would like to welcome you to the IEEE International Wireless Communications and Mobile Computing Conference (IEEE IWCMC 2013) in the beautiful city of Cagliari, Sardinia, Italy (inside the campus of the University of Cagliari)! We are delighted that this year's IEEE IWCMC accomplished its goal under the conference theme “Connectivity Everywhere,” and continues its tradition of providing the premier forum for presentations of research results and experience reporting on the cutting edge research in the general areas of wireless communications and mobile computing. This year, we received more than 630 submissions from many countries around the world. Each paper received at least three peer technical reviews, comprised of more than 480 TPC members from academia, government laboratories, and industries. After carefully examining all review reports, the IEEE IWCMC 2013 TPC finally selected about 35% high-quality papers for presentation at the conference and publication in the IEEE IWCMC 2013 proceedings. The conference program starts on Monday July 1st with a full day of Tutorials that are free of charge to all attendees. Then, each day starts with a keynote speaker chosen from renowned world-class leaders in the area: Dr. Lajos Hanzo, Dr. Robert Schober, and Dr. Daniele Franceschini, highlighting the latest research trends in cooperative wireless communications, how much can we gain by exploiting buffers in wireless relay networks? And giving the industry's perspectives and overview on key technology milestones in the Ultra Mobile Broadband evolution path. This year, the technical sessions reflect the continued and growing interests in a wide range of spectrum, including wireless communications and networks, design and optimization, mobile computing, wireless sensor networks, network security, cloud-assisted computing and pervasive services and use of wireless technologies in different social applications. There are two special sessions composed of invited papers from renowned experts from around the world. Outstanding papers will be selected for four Special Issues in well known international journals. Our objective in the future is to reduce the acceptance rate further.
- Book Chapter
- 10.1002/9781119088042.refs
- Aug 26, 2016
References
- Book Chapter
33
- 10.1007/978-3-642-36169-2_7
- Jan 1, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.
- Research Article
- 10.35335/mantik.vol4.2020.974.pp1658-1662
- Nov 1, 2020
Wireless Local Area Network (WLAN) is an alternative in overcoming cabling problems in a local network. Often wireless network security that is installed still uses vendor default settings such as SSID, IP Address, remote management, DHCP enabled, frequency channels, without encryption, even user or password for wireless administration. How does a strong WLAN security system work? The most common security system applied to wireless networks at this time is starting from securing access points by applying the MAC Filtering concept, using WPA / WPA2-PSK security keys, and RADIUS server authentication. To see the quality of wireless LAN network security, how do you analyze the test of the existing security system in the network. The method that can be used in evaluating wireless networks is by testing the system by simulating forms of attacks on wireless networks with the Penetration Testing method. By carrying out 4 stages of research using the penetration testing method (i) the planning stage, (ii) the discovery stage, (iii) the attack stage and (iv) the report stage, from the attack stage (Cracking The Encryption, Bypassing MAC Address, Attacking The Infrastructure and MITM ) using Kali Linux got the results of four types of attacks carried out, only one of which was failed, namely the cracking attack type of the encryption on the RADIUS server due to using captive portal authentication
- Research Article
- 10.1049/iet-com.2016.1369
- Dec 1, 2016
- IET Communications
This is a Special Issue of IET Communications: ‘Green Computing and Telecommunications Systems,’ published in association with the 3rd International Conference on Computing, Management and Telecommunications (ComManTel 2015). There were 30 submissions to the issue, ranging across the subject of green computing and networks. These spanned emerging technologies and methods for green computing, to green wireless and multimedia telecommunications networks, resource allocation, and test-beds for green telecommunication networks. This Special Issue comprises 9 papers (3 of which were extended from papers presented at ComManTel 2015 and invited to submit to the special issue) which were chosen for publication after a rigorous peer review and selection process. The accepted papers cover the energy-efficiency aspects of telecommunications systems, address the requirement for minimising consumed resources whenever possible, propose approaches for green connected energy as well as presenting designs for components of a green wireless system. The paper entitled “Uplink training for multicell massive multiple-input–multiple-output systems: A combination of time-shifted and time-aligned pilot approaches” by H. V. Nguyen, V.-D. Nguyen and O.-S. Shin proposes two schemes to mitigate the effect of pilot contamination with the aim to improve the achievable uplink and downlink rates in a multicell massive multiple-input–multiple-output (MIMO) system. Their results show that the two proposed strategies significantly improve both the achievable uplink and downlink rates when compared with those of a conventional time-aligned pilot strategy and a previously proposed time-shifted pilot strategy. Considering cellular networks having multi-tier heterogeneous architectures in which the channel conditions change rapidly, D.-A. Le, H.V. Vu, M. Ranjbar, N.H. Tran, T. Karacolak and T.-M. Hoang in the paper “On the capacity and energy efficiency of non-coherent Rayleigh fading channels with additive Gaussian mixture noise” examine the capacity and energy efficiency of non-coherent Rayleigh fading channels with Gaussian mixture noise where neither the transmitter nor the receiver has the knowledge of channel state information. The energy efficiency, which is related to the capacity and optimal input in low-power regimes, is examined by calculating the minimum bit energy and wideband slope of the spectral-efficiency curve. Q.-T. Vien, T.A. Le, B. Barn and C.V. Phan adopt non-orthogonal multiple access (NOMA) and propose power allocation for the wireless downlink of a cloud-based central station to multiple base stations in a heterogeneous cloud radio access network (HCRAN) sharing the same time and frequency resources. The energy efficiency of the practical HCRAN utilising NOMA is analysed taking into account practical channel modelling with power consumptions at base stations of different cell types (e.g. macrocell, microcell etc.) and backhauling power. These results are presented in the paper “Optimising energy efficiency of non-orthogonal multiple access for wireless backhaul in heterogeneous cloud radio access network.” For the potential of fully cooperative OFDM in the design of emerging low power applications, such as a wireless body area network comprising wearable computing devices, L.C. Tran and A. Mertins present an analysis of decode-and-forward, space-time coded, fully cooperative OFDM systems from both error performance and energy efficiency perspectives, in identically/non-identically distributed frequency selective Rayleigh fading channels. Results from their paper “Error performance and energy efficiency analyses of fully cooperative OFDM communication in frequency selective fading” demonstrate that the fully cooperative OFDM outperforms direct OFDM transmission with respect to error performance and energy efficiency in many cases. In their paper entitled ‘’Energy efficient medium access scheme for visible light communication system based on IEEE 802.15.7 with unsaturated traffic’’ H. Liu, L. Zhang and M. Jiang propose a medium access scheme for reducing power consumption and improving the random channel access mechanism for multiuser visible light communication (VLC) networks under unsaturated traffic conditions. The proposed scheme is shown to outperform the IEEE 802.15.7 CSMA/CA scheme in terms of average power consumption, system throughput and packet dropping probability. N.-S. Vo, D.-B. Ha, B. Canberk and J. Zhang propose an energy, bandwidth, and quality (EBQ) optimisation framework for green two-tiered wireless multimedia sensor systems, where the first tier contains the camera sensors and the second includes cluster heads selected from the camera sensors with higher available energy and processing capacity. These results are presented in the paper “Green two-tiered wireless multimedia sensor systems: An energy, bandwidth, and quality optimisation framework.” The next two papers in the issue consider energy harvesting techniques in cooperative and cognitive networks. N.T. Do, D.B. da Costa and B. An consider the joint impact of energy harvesting technique and transceiver hardware impairment on the outage performance of multirelay decode-and-forward cooperative networks in their paper “Performance analysis of multirelay RF energy harvesting cooperative networks with hardware impairments”. It is shown that the “harvested energy-based relay selection” scheme achieves a diversity order of 1 and is independent of the relay numbers, while the “channel quality-base relay selection” scheme achieves full diversity. The paper “Impact of primary networks on the performance of energy harvesting cognitive radio networks” by Jinghua Zhang, N.-P. Nguyen, Junqing Zhang, E. Garcia-Palacios and N.P. Le examines the influence of the primary transmitter's transmit power on the energy harvesting secondary network in the presence of multiple power beacons and multiple secondary transmitters. Results reveal that the influence is negative in both the near/far scenarios of the primary transmitter's location to the secondary network. However, it can be alleviated by increasing the number of power beacons and primary transmitters. The paper “Design of compact frequency reconfigurable planar invert-F antenna for green wireless communications” proposes a single frequency reconfigurable planar invert-F antenna (FRPIFA) using PIN diodes based on the changes of shorting pin positions. H.T.P. Thao, V.T. Luan and V.V. Yem also present a frequency reconfigurable multiple-input multiple-output (MIMO) antenna consisting of two single reconfigurable ones with a distance of half-wavelength, which is shown to achieve a high isolation in all operating bands. The proposed compact single and MIMO antennas are demonstrated as suitable for green wireless communication systems. Trung Q. Duong (S′05, M′12, SM′13) received his Ph.D. degree in Telecommunications Systems from Blekinge Institute of Technology (BTH), Sweden in 2012. Since 2013, he has joined Queen's University Belfast, UK as a Lecturer (Assistant Professor). His current research interests include physical layer security, energy-harvesting communications, and cognitive relay networks. He is the author or co-author of more than 230 technical papers published in scientific journals (116 articles) and presented at international conferences (114 papers). Dr. Duong currently serves as an Editor for IEEE Transactions on Wireless Communications, IEEE Transactions on Communications, IEEE Communications Letters and IET Communications. He was an editor of Wiley Transactions on Emerging Telecommunications Technologies, Electronics Letters and has also served as the Guest Editor of Special Issues in some major journals including IEEE Journal in Selected Areas on Communications, IET Communications, IEEE Access, IEEE Wireless Communications Magazine, IEEE Communications Magazine, EURASIP Journal on Wireless Communications and Networking and EURASIP Journal on Advances Signal Processing. He was awarded the Best Paper Award at the IEEE Vehicular Technology Conference (VTC-Spring) in 2013, and the IEEE International Conference on Communications (ICC) 2014. He is the recipient of the prestigious Royal Academy of Engineering Research Fellowship (2016–2021). Vo Nguyen Quoc Bao (SMIEEE) is an associate professor of Wireless Communications at the Posts and Telecommunications Institute of Technology (PTIT), Vietnam. He also served as Dean of the Faculty of Telecommunications and as Director of the Wireless Communication Laboratory (WCOMM). His research interests include wireless communications and information theory with current emphasis on MIMO systems, cooperative and cognitive communications, physical layer security, and energy harvesting. He has published more than 140 journal and conference articles that have 1300+ citations and H-index of 20. He is an Editor of Transactions on Emerging Telecommunications Technologies (Wiley ETT), VNU Journal of Computer Science and Communication Engineering, and REV Journal on Electronics and Communications. He is also a Guest Editor of a EURASIP Journal on Wireless Communications and Networking “Special Issue:Cooperative Cognitive Networks” and an IET Communications “Special Issue: Secure Physical Layer Communications”. He served as a Technical Program co-chair for ATC (2013, 2014), NAFOSTED-NICS (2014, 2015, 2016), REV-ECIT 2015, ComManTel (2014, 2015), and SigComTel 2017. He is a Member of the Executive Board of the Radio-Electronics Association of Vietnam (REV) and the Electronics Information and Communications Association Ho Chi Minh City (EIC). He is currently serving as a scientific secretary of the Vietnam National Foundation for Science and Technology Development (NAFOSTED) scientific Committee in Information Technology and Computer Science. Mohsen Guizani (S′85–M′89–SM′99–F′09) received B.S. (with distinction) and M.S. degrees in electrical engineering, M.S. and Ph.D. degrees in computer engineering from Syracuse University, Syracuse, NY, USA, in 1984, 1986, 1987, and 1990, respectively. He is currently a professor and Electrical and Communications Engineering Department Chair at the University of Idaho. Previously, he was Professor and Associate Vice President of Graduate Studies at Qatar University, Doha, Qatar, served as Chair of the Computer Science Department, Western Michigan University, Kalamazoo, MI, USA, from 2002 to 2006, and Chair of the Computer Science Department, University of West Florida, Pensacola, FL, USA, from 1999 to 2002. He also served in academic positions at the University of Missouri- Kansas City, Kansas City, MO, USA, University of Colorado-Boulder, Boulder, CO, USA, Syracuse University, and Kuwait University, Kuwait City, Kuwait. His research interests include wireless communications and mobile computing, computer networks, mobile cloud computing, and smart grid. He currently serves on the Editorial Boards of many international technical journals and is the Founder and Editor-in-Chief of Wireless Communications and Mobile Computing journal (Wiley). He is the author of nine books and more than 400 publications in refereed journals and conferences. He has guest edited a number of Special Issues in IEEE journals and magazines. He has also served as member, Chair, and General Chair of a number of conferences. He was selected as the Best Teaching Assistant for two consecutive years at Syracuse University (1988 and 1989). He was the Chair of the IEEE Communications Society Wireless Technical Committee and the Chair of the TAOS Technical Committee. He served as the IEEE Computer Society Distinguished Speaker from 2003 to 2005.
- Research Article
3
- 10.1109/mwc.2020.9116080
- Jun 1, 2020
- IEEE Wireless Communications
The articles in this Special Issue focus on Advances of Security and Privacy Techniques in Emerging Wireless Networks. Wireless networks provide ubiquitous and on-demand connectivity without the need of significant infrastructure deployment, which are pervasive in our daily lives. As multiple wireless technologies proliferate, some emerging wireless networks such as wireless sensor networks, wireless mesh networks, vehicular ad hoc networks, and aerial wireless networks, have gained research attention. Other cutting-edge technologies including Internet of Things, Blockchain, cloud and big data also motivate the development of such networks. As such, more sensitive data than ever are being transmitted over wireless links. Although the emerging wireless networks have attracted much research eff ort, the security issues, as well as the privacy concerns, of these networks have not been fully investigated. Moreover, the involved new techniques also bring more challenges in securely accessing these networks, authentication, user privacy protection and more. To tackle the security and privacy challenges in wireless networks, we organized this Special Issue focusing on security and privacy in emerging wireless networks. The response to our Call for Papers was overwhelming, with 56 submissions. During the review process, each paper was reviewed by at least three experts in the relevant areas, with a rigorous two-round review process. Thanks to the support of the Editor-in-Chief we were able to accept 11 excellent articles covering various aspects of security and privacy in wireless networks. Here, we introduce them and highlight their main contributions.
- Book Chapter
2
- 10.4018/978-1-4666-4691-9.ch004
- Jan 1, 2014
Physical layer (PHY) security has become an emerging area of research recently. Wireless networks use unguided medium as communication channels, so gathering wireless data transmission is easier when compared to traditional cable systems. With the rise of new security challenges, many different solutions have been offered and are being developed. However, maintaining security in wireless networks still remains a challenge. Secure transmission techniques in these networks are discussed throughout this chapter. PHY security measures, the secrecy rate, the secrecy capacity, and the outage secrecy rate are introduced. Security needs of wireless networks are discussed and the related common attack types are described. Main countermeasures that are proposed to prevent these attacks are also presented with both practical and theoretical perspectives.
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.