Providing Physical Layer Security for Mission Critical Machine Type Communication

11/10/2017
by   Andreas Weinand, et al.
0

The design of wireless systems for Mission Critical Machine Type Communication (MC-MTC) is currently a hot research topic. Wireless systems are considered to provide numerous advantages over wired systems in industrial applications for example. However, due to the broadcast nature of the wireless channel, such systems are prone to a wide range of cyber attacks. These range from passive eavesdropping attacks to active attacks like data manipulation or masquerade attacks. Therefore it is necessary to provide reliable and efficient security mechanisms. One of the most important security issue in such a system is to ensure integrity as well as authenticity of exchanged messages over the air between communicating devices in order to prohibit active attacks. In the present work, an approach on how to achieve this goal in MC-MTC systems based on Physical Layer Security (PHYSEC), especially a new method based on keeping track of channel variations, will be presented and a proof-of-concept evaluation is given.

READ FULL TEXT

page 3

page 4

research
11/14/2017

Physical Layer Authentication for Mission Critical Machine Type Communication using Gaussian Mixture Model based Clustering

The application of Mission Critical Machine Type Communication (MC-MTC) ...
research
07/30/2018

Security Solutions for Local Wireless Networks in Control Applications based on Physical Layer Security

The Design of new wireless communication systems for industrial applicat...
research
11/14/2017

Application of Machine Learning for Channel based Message Authentication in Mission Critical Machine Type Communication

The design of robust wireless communication systems for industrial appli...
research
02/12/2020

Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction

Bluetooth is a short-range wireless technology that provides audio and d...
research
03/26/2019

Towards Resilient 5G: Lessons Learned from Experimental Evaluations of LTE Uplink Jamming

Energy, water, health, transportation and emergency services act as back...
research
12/16/2021

Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems

A whole range of attacks becomes possible when adversaries gain physical...
research
11/13/2020

An overview of wireless sensor network security attacks: Mode of operation, severity and mitigation techniques

Wireless Sensor Network (WSN) is the network of the future. As it gradua...

Please sign up or login with your details

Forgot password? Click here to reset