In recent years, research has been conducted on connected vehicles (CVs) that are equipped with communication devices and can be connected to networks. CVs share their own position information and surrounding informat...In recent years, research has been conducted on connected vehicles (CVs) that are equipped with communication devices and can be connected to networks. CVs share their own position information and surrounding information with other vehicles using Vehicle-to-Everything (V2X) communication. CVs can recognize obstacles on non-line-of-sight (NLoS), which cannot be recognized by autonomous vehicles, and reduce travel time to a destination by cooperative driving. Therefore, CVs are expected to provide safe and efficient transportation. On the other hand, problems of security of V2X communication by CVs have been discussed. Safe and efficient transportation by </span><span style="font-family:Verdana;">CVs is on the basis of the assumption that correct vehicle information is </span><span style="font-family:Verdana;">shared. If fake vehicle information is shared, it will affect the driving of CVs. In particular, vehicle position faking has been shown that it can induce traffic congestion and accidents, which is a serious problem. </span><span style="font-family:Verdana;">In this study, we define position faking by CV as misbehavior and propose a method to detect misbehavior on the basis of changes in vehicle position time series data composed of vehicle position information. We evaluated the proposed method using four different misbehavior models. F-measure of misbehavior models that CV sends random position information detected by the proposed method is higher than one by a related method. Therefore, the proposed method </span><span style="font-family:Verdana;">is suitable for detecting misbehavior in which the position information</span><span style="font-family:Verdana;"> changes over time.展开更多
A selfish behavior detection technique is investigated to assist secure cooperative trans- mission at the physical layer. The detection technique calculates the correlation ratio between signals received from the dive...A selfish behavior detection technique is investigated to assist secure cooperative trans- mission at the physical layer. The detection technique calculates the correlation ratio between signals received from the diversity branches to determine the relay' s behavior in amplify and forward coop- eration strategy. The correlation ratio is considerably reduced because the relay' s selfish behavior makes the correlation between the received signals in the diversity branch degraded. Simulation re- sults show that the proposed mechanism can effectively detect selfish nodes and performance will be improved significantly with the destination' s detection technique.展开更多
The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range comm...The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range communication capabilities of smart mobile devices,the decentralized content sharing approach has emerged as a suitable and promising alternative.Decentralized content sharing uses a peer-to-peer network among colocated smart mobile device users to fulfil content requests.Several articles have been published to date to address its different aspects including group management,interest extraction,message forwarding,participation incentive,and content replication.This survey paper summarizes and critically analyzes recent advancements in decentralized content sharing and highlights potential research issues that need further consideration.展开更多
The properties of broadcast nature, high densities of deployment and severe resource limitations of sensor and mobile networks make wireless networks more vulnerable to various attacks, including modification of messa...The properties of broadcast nature, high densities of deployment and severe resource limitations of sensor and mobile networks make wireless networks more vulnerable to various attacks, including modification of messages, eavesdropping, network intrusion and malicious forwarding. Conventional cryptography-based security may consume significant overhead because of low-power devices, so current research shifts to the wireless physical layer for security enhancement. This paper is mainly focused on security issues and solutions for wireless communications at the physical layer. It first describes the RSSI-based and channel based wireless authentication methods respectively, and presents an overview of various secrecy capacity analyses of fading channel, MIMO channel and cooperative transmission, and then examines different misbehavior detection methods. Finally it draws conclusions and introduces the direction of our future work.展开更多
Impressive advances in space technology are enabling complex missions, with potentially significant and long term impacts on human life and activities. In the vision of future space exploration, communication links am...Impressive advances in space technology are enabling complex missions, with potentially significant and long term impacts on human life and activities. In the vision of future space exploration, communication links among planets, satel ites, spacecrafts and crewed vehicles wil be designed according to a new paradigm, known as the disruption tolerant networking. In this scenario, space channel peculiarities impose a massive reengineering of many of the protocols usually adopted in terrestrial networks; among them, security solutions are to be deeply reviewed, and tailored to the specific space requirements. Security is to be provided not only to the payload data exchanged on the network, but also to the telecommands sent to a spacecraft, along possibly differentiated paths. Starting from the secure space telecommand design developed by the Consultative Committee for Space Data Systems as a response to agency-based requirements, an adaptive link layer security architecture is proposed to address some of the chal enges for future space networks. Based on the analysis of the communication environment and the error diffusion properties of the authentication algorithms, a suitable mechanism is proposed to classify frame retransmission requests on the basis of the originating event (error or security attack) and reduce the impact of security operations. An adaptive algorithm to optimize the space control protocol, based on estimates of the time varying space channel, is also presented. The simulation results clearly demonstrate that the proposed architecture is feasible and efficient, especially when facing malicious attacks against frame transmission.展开更多
文摘In recent years, research has been conducted on connected vehicles (CVs) that are equipped with communication devices and can be connected to networks. CVs share their own position information and surrounding information with other vehicles using Vehicle-to-Everything (V2X) communication. CVs can recognize obstacles on non-line-of-sight (NLoS), which cannot be recognized by autonomous vehicles, and reduce travel time to a destination by cooperative driving. Therefore, CVs are expected to provide safe and efficient transportation. On the other hand, problems of security of V2X communication by CVs have been discussed. Safe and efficient transportation by </span><span style="font-family:Verdana;">CVs is on the basis of the assumption that correct vehicle information is </span><span style="font-family:Verdana;">shared. If fake vehicle information is shared, it will affect the driving of CVs. In particular, vehicle position faking has been shown that it can induce traffic congestion and accidents, which is a serious problem. </span><span style="font-family:Verdana;">In this study, we define position faking by CV as misbehavior and propose a method to detect misbehavior on the basis of changes in vehicle position time series data composed of vehicle position information. We evaluated the proposed method using four different misbehavior models. F-measure of misbehavior models that CV sends random position information detected by the proposed method is higher than one by a related method. Therefore, the proposed method </span><span style="font-family:Verdana;">is suitable for detecting misbehavior in which the position information</span><span style="font-family:Verdana;"> changes over time.
基金Supported by the National High Technology Research and Development Program of China("863"Program) (2009AA011507)
文摘A selfish behavior detection technique is investigated to assist secure cooperative trans- mission at the physical layer. The detection technique calculates the correlation ratio between signals received from the diversity branches to determine the relay' s behavior in amplify and forward coop- eration strategy. The correlation ratio is considerably reduced because the relay' s selfish behavior makes the correlation between the received signals in the diversity branch degraded. Simulation re- sults show that the proposed mechanism can effectively detect selfish nodes and performance will be improved significantly with the destination' s detection technique.
文摘The evolution of smart mobile devices has significantly impacted the way we generate and share contents and introduced a huge volume of Internet traffic.To address this issue and take advantage of the short-range communication capabilities of smart mobile devices,the decentralized content sharing approach has emerged as a suitable and promising alternative.Decentralized content sharing uses a peer-to-peer network among colocated smart mobile device users to fulfil content requests.Several articles have been published to date to address its different aspects including group management,interest extraction,message forwarding,participation incentive,and content replication.This survey paper summarizes and critically analyzes recent advancements in decentralized content sharing and highlights potential research issues that need further consideration.
基金supported in part by State Key Program of National Nature Science Foundation of China under Grant No.60932003National High Technical Research and Development Program of China (863 Program ) under Grant No.2007AA01Z452
文摘The properties of broadcast nature, high densities of deployment and severe resource limitations of sensor and mobile networks make wireless networks more vulnerable to various attacks, including modification of messages, eavesdropping, network intrusion and malicious forwarding. Conventional cryptography-based security may consume significant overhead because of low-power devices, so current research shifts to the wireless physical layer for security enhancement. This paper is mainly focused on security issues and solutions for wireless communications at the physical layer. It first describes the RSSI-based and channel based wireless authentication methods respectively, and presents an overview of various secrecy capacity analyses of fading channel, MIMO channel and cooperative transmission, and then examines different misbehavior detection methods. Finally it draws conclusions and introduces the direction of our future work.
基金supported by the National Natural Science Fundation of China(61101073)
文摘Impressive advances in space technology are enabling complex missions, with potentially significant and long term impacts on human life and activities. In the vision of future space exploration, communication links among planets, satel ites, spacecrafts and crewed vehicles wil be designed according to a new paradigm, known as the disruption tolerant networking. In this scenario, space channel peculiarities impose a massive reengineering of many of the protocols usually adopted in terrestrial networks; among them, security solutions are to be deeply reviewed, and tailored to the specific space requirements. Security is to be provided not only to the payload data exchanged on the network, but also to the telecommands sent to a spacecraft, along possibly differentiated paths. Starting from the secure space telecommand design developed by the Consultative Committee for Space Data Systems as a response to agency-based requirements, an adaptive link layer security architecture is proposed to address some of the chal enges for future space networks. Based on the analysis of the communication environment and the error diffusion properties of the authentication algorithms, a suitable mechanism is proposed to classify frame retransmission requests on the basis of the originating event (error or security attack) and reduce the impact of security operations. An adaptive algorithm to optimize the space control protocol, based on estimates of the time varying space channel, is also presented. The simulation results clearly demonstrate that the proposed architecture is feasible and efficient, especially when facing malicious attacks against frame transmission.