-
Doppler Spoofing in OFDM Wireless Communication Systems
Authors:
Antonios Argyriou,
Dimitrios Kosmanos
Abstract:
In this paper we present a method that prevents an unauthorized receiver (URx) from correctly estimating the Doppler shift present in an orthogonal frequency division multiplexing (OFDM) wireless signal. To prevent this estimation we propose to insert an artificial frequency variation in the transmitted signal that mimics a transmitter (Tx) movement with a spoofed/fake speed. This spoofed Doppler…
▽ More
In this paper we present a method that prevents an unauthorized receiver (URx) from correctly estimating the Doppler shift present in an orthogonal frequency division multiplexing (OFDM) wireless signal. To prevent this estimation we propose to insert an artificial frequency variation in the transmitted signal that mimics a transmitter (Tx) movement with a spoofed/fake speed. This spoofed Doppler shift does not affect data demodulation since it can be compensated at the legitimate receiver (LRx). We evaluate our method for its efficacy through simulations and we show that it offers a reliable way to protect one key element of the privacy of a wireless source, namely the speed of the transmitter.
△ Less
Submitted 29 December, 2022;
originally announced December 2022.
-
Electric Vehicle Charging: a Survey on the Security Issues and Challenges of the Open Charge Point Protocol (OCPP)
Authors:
Z. Garofalaki,
D. Kosmanos,
S. Moschoyiannis,
D. Kallergis,
C. Douligeris
Abstract:
The increased use of smart Electric Vehicles (EVs) and Plug-in Electric Vehicles (PEV) opened a new area of research and development. The number of EV charging sites has considerably increased in residential as well as in public areas. Within these EV charging sites, various entities need to communicate in a secure and efficient way. The Open Charge Point Protocol (OCPP) offers a way to coordinate…
▽ More
The increased use of smart Electric Vehicles (EVs) and Plug-in Electric Vehicles (PEV) opened a new area of research and development. The number of EV charging sites has considerably increased in residential as well as in public areas. Within these EV charging sites, various entities need to communicate in a secure and efficient way. The Open Charge Point Protocol (OCPP) offers a way to coordinate this communication and is already being used in many implementations. However, only the latest OCPP 2.0 version of the protocol includes certain security features. In this article, we present the entities that take part in an OCPP-based smart charging scenario, we identify security issues and threats and present solutions that have been proposed by scholars.We identify open security issues for OCPP and propose future research directions for the security enhancement of the protocol.
△ Less
Submitted 5 July, 2022;
originally announced July 2022.
-
Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks
Authors:
Dimitrios Kosmanos,
Savvas Chatzisavvas,
Antonios Argyriou,
Leandros Maglaras
Abstract:
In this paper, we are concerned with the problem of estimating the speed of an RF jammer that moves towards a group/platoon of moving wireless communicating nodes. In our system model, the group of nodes receives an information signal from a master node, that they want to decode, while the Radio Frequency (RF) jammer desires to disrupt this communication as it approaches them. For this system mode…
▽ More
In this paper, we are concerned with the problem of estimating the speed of an RF jammer that moves towards a group/platoon of moving wireless communicating nodes. In our system model, the group of nodes receives an information signal from a master node, that they want to decode, while the Radio Frequency (RF) jammer desires to disrupt this communication as it approaches them. For this system model, we propose first a transmission scheme where the master node remains silent for a time period while it transmits in a subsequent slot. Second, we develop a joint data and jamming estimation algorithm that uses Linear Minimum Mean Square Error (LMMSE) estimation. We develop analytical closed-form expressions that characterize the Mean Square Error (MSE) of the data and jamming signal estimates. Third, we propose a cooperative jammer speed estimation algorithm based on the jamming signal estimates at each node of the network. Our numerical and simulation results for different system configurations prove the ability of our overall system to estimate with high accuracy and the RF jamming signals and the speed of the jammer.
△ Less
Submitted 21 April, 2020;
originally announced April 2020.
-
RF Jamming Classification using Relative Speed Estimation in Vehicular Wireless Networks
Authors:
Dimitrios Kosmanos,
Dimitrios Karagiannis,
Antonios Argyriou,
Spyros Lalis,
Leandros Maglaras
Abstract:
Wireless communications are vulnerable against radio frequency (RF) jamming which might be caused either intentionally or unintentionally. A particular subset of wireless networks, vehicular ad-hoc networks (VANET) which incorporate a series of safety-critical applications, may be a potential target of RF jamming with detrimental safety effects. To ensure secure communication and defend it against…
▽ More
Wireless communications are vulnerable against radio frequency (RF) jamming which might be caused either intentionally or unintentionally. A particular subset of wireless networks, vehicular ad-hoc networks (VANET) which incorporate a series of safety-critical applications, may be a potential target of RF jamming with detrimental safety effects. To ensure secure communication and defend it against this type of attacks, an accurate detection scheme must be adopted. In this paper we introduce a detection scheme that is based on supervised learning. The machine-learning algorithms, KNearest Neighbors (KNN) and Random Forests (RF), utilize a series of features among which is the metric of the variations of relative speed (VRS) between the jammer and the receiver that is passively estimated from the combined value of the useful and the jamming signal at the receiver. To the best of our knowledge, this metric has never been utilized before in a machine-learning detection scheme in the literature. Through offline training and the proposed KNN-VRS, RF-VRS classification algorithms, we are able to efficiently detect various cases of Denial of Service Attacks (DoS) jamming attacks, differentiate them from cases of interference as well as foresee a potential danger successfully and act accordingly.
△ Less
Submitted 31 December, 2018;
originally announced December 2018.
-
Estimating the Relative Speed of RF Jammers in VANETs
Authors:
Dimitrios Kosmanos,
Antonios Argyriou,
Leandros Maglaras
Abstract:
Vehicular Ad-Hoc Networks (VANETs) aim at enhancing road safety and providing a comfortable driving environment by delivering early warning and infotainment messages to the drivers. Jamming attacks, however, pose a significant threat to their performance. In this paper, we propose a novel Relative Speed Estimation Algorithm (RSEA) of a moving interfering vehicle that approaches a Transmitter (…
▽ More
Vehicular Ad-Hoc Networks (VANETs) aim at enhancing road safety and providing a comfortable driving environment by delivering early warning and infotainment messages to the drivers. Jamming attacks, however, pose a significant threat to their performance. In this paper, we propose a novel Relative Speed Estimation Algorithm (RSEA) of a moving interfering vehicle that approaches a Transmitter ($Tx$) - Receiver ($Rx$) pair, that interferes with their Radio Frequency (RF) communication by conducting a Denial of Service (DoS) attack. Our scheme is completely sensorless and passive and uses a pilot-based received signal without hardware or computational cost in order to, firstly, estimate the combined channel between the transmitter - receiver and jammer - receiver and secondly, to estimate the jamming signal and the relative speed between the jammer - receiver using the RF Doppler shift. Moreover, the relative speed metric exploits the Angle of Projection (AOP) of the speed vector of the jammer in the axis of its motion in order to form a two-dimensional representation of the geographical area. This approach can effectively be applied both for a jamming signal completely unknown to the receiver and for a jamming signal partly known to the receiver. Our speed estimator method is proven to have quite accurate performance, with a Mean Absolute Error (MAE) value of approximately $10\%$ compared to the optimal zero MAE value under different jamming attack scenarios.
△ Less
Submitted 31 December, 2018;
originally announced December 2018.
-
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
Authors:
Mohamed Amine Ferrag,
Leandros Maglaras,
Antonios Argyriou,
Dimitrios Kosmanos,
Helge Janicke
Abstract:
This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks against…
▽ More
This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks against privacy, attacks against integrity, attacks against availability, and attacks against authentication. We also provide a classification of countermeasures into three types of categories, including, cryptography methods, humans factors, and intrusion detection methods. The countermeasures and informal and formal security analysis techniques used by the authentication and privacy preserving schemes are summarized in form of tables. Based on the categorization of the authentication and privacy models, we classify these schemes in seven types, including, handover authentication with privacy, mutual authentication with privacy, RFID authentication with privacy, deniable authentication with privacy, authentication with mutual anonymity, authentication and key agreement with privacy, and three-factor authentication with privacy. In addition, we provide a taxonomy and comparison of authentication and privacy-preserving schemes for 4G and 5G cellular networks in form of tables. Based on the current survey, several recommendations for further research are discussed at the end of this paper.
△ Less
Submitted 14 August, 2017;
originally announced August 2017.
-
Joint Time-Domain Resource Partitioning, Rate Allocation, and Video Quality Adaptation in Heterogeneous Cellular Networks
Authors:
Antonios Argyriou,
Dimitrios Kosmanos,
Leandros Tassiulas
Abstract:
Heterogenous cellular networks (HCN) introduce small cells within the transmission range of a macrocell. For the efficient operation of HCNs it is essential that the high power macrocell shuts off its transmissions for an appropriate amount of time in order for the low power small cells to transmit. This is a mechanism that allows time-domain resource partitioning (TDRP) and is critical to be opti…
▽ More
Heterogenous cellular networks (HCN) introduce small cells within the transmission range of a macrocell. For the efficient operation of HCNs it is essential that the high power macrocell shuts off its transmissions for an appropriate amount of time in order for the low power small cells to transmit. This is a mechanism that allows time-domain resource partitioning (TDRP) and is critical to be optimized for maximizing the throughput of the complete HCN. In this paper, we investigate video communication in HCNs when TDRP is employed. After defining a detailed system model for video streaming in such a HCN, we consider the problem of maximizing the experienced video quality at all the users, by jointly optimizing the TDRP for the HCN, the rate allocated to each specific user, and the selected video quality transmitted to a user. The NP-hard problem is solved with a primal-dual approximation algorithm that decomposes the problem into simpler subproblems, making them amenable to fast well-known solution algorithms. Consequently, the calculated solution can be enforced in the time scale of real-life video streaming sessions. This last observation motivates the enhancement of the proposed framework to support video delivery with dynamic adaptive streaming over HTTP (DASH). Our extensive simulation results demonstrate clearly the need for our holistic approach for improving the video quality and playback performance of the video streaming users in HCNs.
△ Less
Submitted 27 June, 2015;
originally announced June 2015.