2018
DOI: 10.1007/978-3-030-04537-1_5
|View full text |Cite
|
Sign up to set email alerts
|

Securing Data in Power-Limited Sensor Networks Using Two-Channel Communications

Abstract: Confidentiality and integrity of wireless data transmissions are vital for sensor networks used in critical infrastructure assets. While the challenges could be addressed using standard encryption techniques, the sensors are often power-limited, bandwidth-constrained or too rudimentary to accommodate the power and latency overhead of robust encryption and decryption implementations. To address this gap, this chapter proposes a novel methodology in which data is split between two distinct wireless channels to a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…Algorithm 1 Login automation on the fake captive portal Input: username ← randomString (10) Input: password ← randomString (10) 1: Load captive portal URL 2: if pageLoaded then…”
Section: Network With Captive Portalmentioning
confidence: 99%
See 2 more Smart Citations
“…Algorithm 1 Login automation on the fake captive portal Input: username ← randomString (10) Input: password ← randomString (10) 1: Load captive portal URL 2: if pageLoaded then…”
Section: Network With Captive Portalmentioning
confidence: 99%
“…On the other hand, we looked at how the number of rounds could affect the performance of the detection prototype. We tested the prototype by collecting AP details in two (2), ten (10), and twenty (20) and fifty (50) rounds. The lower number of rounds would reduce the time taken for scanning and detection (better speed), however, it would affect the detection accuracy.…”
Section: Testingmentioning
confidence: 99%
See 1 more Smart Citation
“…A successful spoofing attack's sender or receiver address is disguised to appear legitimate. As a result, the receiver does not notice the sender's valid address, and the sender sends packets to a bogus or spoofed address (Wolfe et al, 2018). An attack occurs when an attacker successfully creates illegitimate Wi-Fi APs in wireless networks, and a user connects to it.…”
mentioning
confidence: 99%