• DocumentCode
    680956
  • Title

    Watching for Weakness in Wild WPANs

  • Author

    Ramsey, Benjamin W. ; Mullins, Barry E. ; Speers, Ryan ; Batterton, Katherine A.

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Air Force Inst. of Technol., Wright-Patterson AFB, OH, USA
  • fYear
    2013
  • fDate
    18-20 Nov. 2013
  • Firstpage
    1404
  • Lastpage
    1409
  • Abstract
    Low-rate Wireless Personal Area Networks (WPANs) are inexpensive to deploy and operate, making them a popular choice for monitoring and controlling infrastructure. Many simulations have been conducted to study WPANs for performance, scalability and security. However, the accuracy of these simulations is wholly dependent upon their underlying assumptions. In this paper we test these assumptions by passively observing and analyzing real-world low-rate WPANs operating in ten U.S. cities and three vendor-programmed demonstration kits. We evaluate the security measures of operational WPANs and statistically study their wireless traffic patterns. Our investigations indicate that popular simulation assumptions about low-rate WPANs do not accurately reflect the nature of the observed networks. We also find evidence of faulty security in an operational WPAN.
  • Keywords
    military communication; personal area networks; telecommunication security; telecommunication traffic; security measures; vendor-programmed demonstration kits; wild WPAN; wireless personal area networks; wireless traffic patterns; Communication system security; Cryptography; Payloads; Wireless communication; Wireless personal area networks; Zigbee;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Military Communications Conference, MILCOM 2013 - 2013 IEEE
  • Conference_Location
    San Diego, CA
  • Type

    conf

  • DOI
    10.1109/MILCOM.2013.238
  • Filename
    6735820