Current Issue : January - March Volume : 2021 Issue Number : 1 Articles : 5 Articles
We present a novel attack named â??Authenticator Rebinding Attack,â? which aims at the Fast IDentity Online (FIDO) Universal\nAuthentication Framework (UAF) protocol implemented on mobile devices. The presented Authenticator Rebinding Attack\nrebinds the victimâ??s identity to the attackerâ??s authenticator rather than the victimâ??s authenticator being verified by the service in\nthe UAF protocol, allowing the attacker to bypass the UAF protocol local authentication mechanism by imitating the victim to\nperform sensitive operations such as transfer and payment. The lack of effective authentication between entities in the\nimplementations of the UAF protocol used in the actual system causes the vulnerability to the Authenticator Rebinding Attack.\nIn this paper, we implement this attack on the Android platform and evaluate its implementability, where results show that the\nproposed attack is implementable in the actual system and Android applications using the UAF protocol are prone to such\nattack. We also discuss the possible countermeasures against the threats posed by Authenticator Rebinding Attack for different\nstakeholders implementing UAF on the Android platform....
During emergencies LTE/5G-based public mobile land networks (PLMNs) restrict network\naccess by normal users, which means a lack of service reliability which limits application of LTE/5G\nfor machine-type communication (MTC) in critical applications, such as power systems This paper\nshows how existing LTE/5G features can be used to differentiate MTC of devices in a microgrid from\nother MTC or human-to-human (H2H) communication and ensure that these microgrid devices have\nservice during emergencies, which enables use of LTE/5G communication to co-ordinate the use of\ndistributed energy resources (DER) in microgrids, so that they can autarkically perform blackout\nrecovery of an islanded microgrid. It is shown that this method allows the blackout recovery 100 times\nfaster than with a conventional black start....
In this paper, an improved routing algorithm suitable for planar networksâ??static Zigbee\nand mesh networks includedâ??is shown. The algorithm is based on the cycle description of the graph,\nand on a new graph model based on arrow description, which is outlined. We show that the newly\ndeveloped model allows for a faster algorithm for finding a direct and a return path in the network.\nThe newly developed model allows further interpretations of the relationships in any simple planar\ngraphs. Examples showing the implementation of the newly developed model are presented too....
In this paper, the resource allocation for vehicle-to-everything (V2X) underlaying 5G cellular mobile communication networks is\nconsidered. The optimization problem is modeled as a mixed binary integer nonlinear programming (MBINP), which minimizes\nthe interference to 5G cellular users (CUs) subject to the quality of service (QoS), the total available power, the interference\nthreshold, and the minimal transmission rate. To achieve that, the original MBINP is decomposed into three steps: transmission\npower initialization, subchannel assignment, and power allocation. Firstly, the minimum transmission power required by the\nV2X users (VUs) is set as the initial power value. Secondly, the Hungarian algorithm is used to obtain the appropriate\nsubchannel. Finally, an optimization mechanism is proposed to the power allocation. Simulation results show that the proposed\nalgorithm can not only ensure the minimal transmission rate of VUs but also further improve the CUsâ?? channel capacity under\nthe premise of guaranteeing the QoS of the CUs....
The current demand for a wireless electromagnetic spectrum is higher than ever before\ndue to rapid technological development in the field of information and communication technologies\nthat has resulted in monumental growth in data-centric services. The usage of idle TV channels in\nthe Television Ultra High Frequencies (TV-UHF) band (500â??698 MHz), also known as Television\nWhite Spaces (TVWS), is a relatively new and promising concept for wireless connectivity that can\nbe used to cater to the demand. A challenge in this setting is to figure out a fast and cost-effective\nmethod of TVWS presence estimation, such as the use of open hardware and software tools, reducing\nsensing time. This article proposes a Rapid Estimation Method (REM) for TVWS estimation that uses\nthe statistical information of the sensed signals....
Loading....