Efficient communications are crucial for disaster response and recovery. However, most current public safety land mobile radio (LMR) networks only provide narrowband voice service with limited support of low-speed data services. In this paper, we study to enhance the interoperability of LMR with commercial wireless cellular networks, by which a wide variety of benefits can be offered to disaster responders, including new multimedia services, increased data rates and low cost devices. Our approach is based on Session Initiation Protocol (SIP) and a joint radio resource management framework. We use a novel SIP- based seamless handoff scheme to support the interoperability between cellular and LMR networks. In addition, an optimal radio resource management scheme is proposed to maximize the overall radio resource utilization and at the same time guarantee service availability and continuity quality of service (QoS) for disaster responders. The effectiveness of the proposed schemes is illustrated by numerical examples.
Cognitive radios (CRs), which are capable of sensing its surrounding environment and adapting its internal parameters, have been considered in mobile ad hoc networks (MANETs). The area of security in CR-MANETs has received far less attention than other areas. However, some distinct characteristics of CRs introduce new non-trivial security risks to CR-MANETs. In this article, the authors study spectrum sensing data falsification (SSDF) attacks to CR-MANETs, in which intruders send false local spectrum sensing results in cooperative spectrum sensing, and it will result in wrong spectrum sensing decisions by CRs. The authors present a novel bio-inspired consensus-based cooperative spectrum sensing scheme to counter SSDF attacks in CR-MANETs. Their scheme is based on recent advances in consensus algorithms that have taken inspiration from self-organising behaviour of animal groups such as birds, fish, ants, honeybees and others. Unlike the existing schemes, there is no need for a common receiver to do the data fusion for reaching the final decision to counter SSDF attacks. The scheme has self-configuration and self-maintenance capabilities. Moreover, in order to further improve the security of CR-MANETs, the authors present an authentication scheme using identity (ID)-based cryptography with threshold secret sharing. Simulation results are presented to show the effectiveness of the proposed schemes.
Continuous authentication is an important prevention-based approach to protect high security mobile ad-hoc networks (MANETs). On the other hand, intrusion detection systems (IDSs) are also important in MANETs to effectively identify malicious activities. Considering these two approaches jointly is effective in optimal security design taking into account system security requirements and resource constraints in MANETs. To obtain the optimal scheme of combining continuous authentication and IDSs in a distributed manner, we formulate the problem as a partially observable distributed stochastic system. We present structural results for this problem in order to decrease computational complexity, making our solution usable in large networks. The policies derived from structural results are easy to implement in practical MANETs. Simulation results are presented to show the performance of this method for the proposed scheme.
Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most of existing works on applying game theories to security only consider two players in the security game model: an attacker and a defender. While this assumption may be valid for a network with centralized administration, it is not realistic in MANETs, where centralized administration is not available. In this paper, using recent advances in mean field game theory, we propose a novel game theoretic approach with multiple players for security in MANETs. The mean field game theory provides a powerful mathematical tool for problems with a large number of players. The proposed scheme can enable an individual node in MANETs to make strategic security defence decisions without centralized administration. In addition, since security defence mechanisms consume precious system resources (e.g., energy), the proposed scheme considers not only the security requirement of MANETs but also the system resources. Moreover, each node in the proposed scheme only needs to know its own state information and the aggregate effect of the other nodes in the MANET. Therefore, the proposed scheme is a fully distributed scheme. Simulation results are presented to illustrate the effectiveness of the proposed scheme.
Location privacy preservation in multi-channel cognitive radio mobile ad hoc networks (CR-MANETs) is a challenging issue, where the network does not rely on a trusted central entity to impose privacy-preserving protocols. Furthermore, even though the multi-channel CR-MANETs have numerous advantages, utilization of multiple channels degrades the location privacy, by disclosing more information about CRs. In this paper, location privacy is studied for cooperative spectrum sensing (CSS) in multi-channel CR-MANETs.We first quantify the location privacy. Then, we propose a new privacy-preserving distributed cooperative spectrum sensing scheme for multi-channel CR-MANETs. We design a new anonymization method based on random manipulation of the exchanged signal-to-noise ratio (SNR). Afterwards, a coalitional game-theoretic distributed channel assignment is proposed to maximize location privacy and sensing performance over each channel in the network. Simulation results show that the proposed scheme can enhance sensing performance and location privacy over multiple channels.
Tactical mobile ad hoc networks (MANETs) impose special challenges for designing authentication schemes because of the hostile environments in which they may operate. In this paper, we propose a lightweight integrated authentication (LIA) scheme for tactical MANETs. Our proposal is a lightweight and efficient solution that is suitable for use in tactical MANETs because it has the following features: 1) integration of user-to-device authentication and device-to-network authentication 2) trust-enhanced routing table and 3) distributed revocation authority.
With recent advances of information and communication technology, smart city has been emerged as a new paradigm to dynamically optimize the resources in cities and provide better facilities and quality of life for the citizens. Smart cities involve a variety of components, including ubiquitous sensing devices, heterogeneous networks, large-scale databases, and powerful data centers to collect, transfer, store, and intelligently process real-time information. Smart cities can offer new applications and services for augmenting the daily life of citizens on making decisions, energy consumption, transportation, health-care, and education. Despite the potential vision of smart cities, security and privacy issues remain to be carefully addressed. This paper delineates a comprehensive survey of security and privacy issues of smart cities, and presents a basis for categorizing the present and future developments within this area. It also presents a thematic taxonomy of security and privacy issues of smart cities to highlight the security requirements for designing a secure smart city, identify the existing security and privacy solutions, and present open research issues and challenges of security and privacy in smart cities.
In cooperative wireless networks, relay nodes are used to improve the channel capacity of the system. However, the presence of malicious relays in the network may severely degrade the performance of the system. More specifically, there exists a possibility that a node refuses to cooperate when it is selected for cooperation or deliberately drop the received packets. Trust establishment is a mechanism to detect misbehaving nodes in a network. In this paper, we propose a trust establishment method for cooperative wireless networks using Bayesian framework. In contrast with previous schemes, this approach takes the channel state information and relay selection policy into account to derive a pure trust value for each relay node. The proposed method can be applied to any system with a general relay selection policy whose decisions in each cooperative transmission are independent of the previous ones. Moreover, it does not impose additional communication overhead on the system as it uses the available information in relay selection procedure.
Cognitive radios (CRs) have been considered for use in mobile ad hoc networks (MANETs). The area of security in Cognitive Radio MANETs (CR-MANETs) has yet to receive much attention. However, some distinct characteristics of CRs introduce new, non-trivial security risks to CR-MANETs. In this paper, we study spectrum sensing data falsification (SSDF) attacks to CR-MANETs, in which intruders send false local spectrum sensing results in cooperative spectrum sensing, and SSDF may result in incorrect spectrum sensing decisions by CRs. We present a consensus-based cooperative spectrum sensing scheme to counter SSDF attacks in CR-MANETs. Our scheme is based on recent advances in consensus algorithms that have taken inspiration from self-organizing behavior of animal groups such as fish. Unlike the existing schemes, there is no need for a common receiver to do the data fusion for reaching the final decision to counter SSDF attacks. Simulation results are presented to show the effectiveness of the proposed scheme.
Distributed cooperative spectrum sensing is an effective and feasible approach to detect primary users in Cognitive Radio Mobile Ad Hoc NETworks (CR-MANETs). However, due to the dynamic and interdependent characteristics of this approach, malicious attackers can interrupt the normal spectrum sensing more easily in open environments by spectrum sensing data falsification attacks. Meanwhile, attackers can perform traditional attacks to data transmission in MANETs. Towards these complicated situations in CR-MANETs, we study a new type of attack named joint dynamic spectrum sensing and data transmission attack in this paper. We propose a trust based framework to protect both distributed cooperative spectrum sensing and data transmission. For protection of distributed cooperative spectrum sensing, a weighted-average consensus algorithm with trust is applied to degrade the impact of malicious secondary users. At the same time, data transmission in a network formed by secondary users can be protected by trust with direct and indirect observations. Simulation results show the effectiveness and performance of the proposed framework under different experimental scenarios.