2017 IEEE 42nd Conference on Local Computer Networks (LCN) 2017
DOI: 10.1109/lcn.2017.47
|View full text |Cite
|
Sign up to set email alerts
|

SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios

Abstract: During disasters, existing telecommunication infrastructures are often congested or even destroyed. In these situations, mobile devices can be interconnected using wireless ad hoc and disruption-tolerant networking to establish a backup emergency communication system for civilians and emergency services. However, such communication systems entail serious security risks, since adversaries may attempt to steal confidential data, fake notifications of emergency services, or perform denialof-service (DoS) attacks.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…In addition, satellite radios are expensive to operate and, therefore, device density is typically low in the field. Self-organizing networks such as DTNs [33] where devices forward messages for one another can be deployed anywhere without any dependencies on existing infrastructure (I. 3).…”
Section: Discussionmentioning
confidence: 99%
“…In addition, satellite radios are expensive to operate and, therefore, device density is typically low in the field. Self-organizing networks such as DTNs [33] where devices forward messages for one another can be deployed anywhere without any dependencies on existing infrastructure (I. 3).…”
Section: Discussionmentioning
confidence: 99%
“…SEDCOS (A Secure Device-to-Device Communication System for Disaster Scenarios) [20] has been especially designed with security considerations. It adopts an adversary based model and employs secure key management and resilient communication to counter denial of service (DoS) attacks.…”
Section: Related Workmentioning
confidence: 99%
“…These devices may be used for rescue communications and data sharing or people requesting for aid or other emergency services. Due to this wireless, cooperative, and decentralized nature, these systems are vulnerable to various security attacks such as relief communication disruption by terrorists by injecting false messages, denial-of-service (DoS), and unintentional clogging of the network by spamming from people in panic [20]. Moreover, malicious attacks could damage strategic nodes or links in the network and, therefore, the underlying routing protocols and metrics should be designed to introduce resilience against these types of attacks.…”
Section: E Security and Resiliencementioning
confidence: 99%
“…Third, an open re-implementation of the protocol would allow interoperability with other operating systems, eventually enabling high-throughput cross-platform direct communication. Such technology is required, for example, in smartphone-based emergency communication applications [21,25].…”
Section: Introductionmentioning
confidence: 99%