DocumentCode
680956
Title
Watching for Weakness in Wild WPANs
Author
Ramsey, Benjamin W. ; Mullins, Barry E. ; Speers, Ryan ; Batterton, Katherine A.
Author_Institution
Dept. of Electr. & Comput. Eng., Air Force Inst. of Technol., Wright-Patterson AFB, OH, USA
fYear
2013
fDate
18-20 Nov. 2013
Firstpage
1404
Lastpage
1409
Abstract
Low-rate Wireless Personal Area Networks (WPANs) are inexpensive to deploy and operate, making them a popular choice for monitoring and controlling infrastructure. Many simulations have been conducted to study WPANs for performance, scalability and security. However, the accuracy of these simulations is wholly dependent upon their underlying assumptions. In this paper we test these assumptions by passively observing and analyzing real-world low-rate WPANs operating in ten U.S. cities and three vendor-programmed demonstration kits. We evaluate the security measures of operational WPANs and statistically study their wireless traffic patterns. Our investigations indicate that popular simulation assumptions about low-rate WPANs do not accurately reflect the nature of the observed networks. We also find evidence of faulty security in an operational WPAN.
Keywords
military communication; personal area networks; telecommunication security; telecommunication traffic; security measures; vendor-programmed demonstration kits; wild WPAN; wireless personal area networks; wireless traffic patterns; Communication system security; Cryptography; Payloads; Wireless communication; Wireless personal area networks; Zigbee;
fLanguage
English
Publisher
ieee
Conference_Titel
Military Communications Conference, MILCOM 2013 - 2013 IEEE
Conference_Location
San Diego, CA
Type
conf
DOI
10.1109/MILCOM.2013.238
Filename
6735820
Link To Document