uu.seUppsala University Publications
Change search
Link to record
Permanent link

Direct link
BETA
Hewage, Kasun
Publications (10 of 15) Show all publications
Hewage, K., Raza, S. & Voigt, T. (2017). Protecting Glossy-based Wireless Networks from Packet Injection Attacks. In: Proceeding of the 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS): . Paper presented at 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 22-25 Oct., 2017, Orlando, FL, USA. (pp. 37-45). Orlando: IEEE
Open this publication in new window or tab >>Protecting Glossy-based Wireless Networks from Packet Injection Attacks
2017 (English)In: Proceeding of the 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Orlando: IEEE, 2017, p. 37-45Conference paper, Published paper (Refereed)
Abstract [en]

Glossy is a flooding-based communication primitive for low-power wireless networks that leverages constructive interference to achieve high reliability. The Low-power Wireless Bus (LWB) uses Glossy to abstract an entire wireless network into a shared bus like topology. As Glossy is not designed as a secure communication protocol, Glossy and hence LWB are vulnerable to unauthorised eavesdropping and packet injection attacks. In this paper, we propose several security mechanisms to protect Glossy and LWB communication and evaluate their effectiveness in real-world settings. The evaluation of the proposed security mechanisms shows that we can confine the effect of the packet injection attacks on Glossy networks into single hop nodes from the attacker.

Place, publisher, year, edition, pages
Orlando: IEEE, 2017
Series
IEEE International Conference on Mobile Ad-hoc and Sensor Systems, ISSN 2155-6806, E-ISSN 2155-6814
National Category
Communication Systems
Identifiers
urn:nbn:se:uu:diva-335159 (URN)10.1109/MASS.2017.67 (DOI)000427360900005 ()978-1-5386-2325-1 (ISBN)978-1-5386-2324-4 (ISBN)978-1-5386-2323-7 (ISBN)
Conference
14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 22-25 Oct., 2017, Orlando, FL, USA.
Available from: 2017-12-01 Created: 2017-12-01 Last updated: 2018-09-20
Jayasuriya, N., Ranathunga, T., Gunawardana, K., Silva, C., Kumarasinghe, K., Sayakkara, A., . . . Voigt, T. (2017). Resource-Efficient Detection of Elephant Rumbles. In: SenSys '17 Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems: . Paper presented at Delft, Netherlands, November 06-08, 2017. , Article ID 65.
Open this publication in new window or tab >>Resource-Efficient Detection of Elephant Rumbles
Show others...
2017 (English)In: SenSys '17 Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017, article id 65Conference paper, Poster (with or without abstract) (Refereed)
Abstract [en]

The human-elephant conflict is causing significant damages to the life of human and elephants in Sri Lanka. Minimizing encounters between humans and elephants is hence crucial in alleviating the human-elephant conflict. We have earlier introduced Eloc, a cost-effective localization system that is based on infrasonic emissions from wild elephants. One of the remaining challenges is a resource-efficient method to detect the elephants' infrasonic emissions. We present our efforts on devising a support vector machine (SVM) that is able to detect elephant rumbles on Eloc nodes.

Keywords
Elephant Detection; Infra Sound Localization
National Category
Computer Engineering
Identifiers
urn:nbn:se:uu:diva-333872 (URN)10.1145/3131672.3136982 (DOI)000462783500065 ()
Conference
Delft, Netherlands, November 06-08, 2017
Available from: 2017-11-17 Created: 2017-11-17 Last updated: 2019-08-22Bibliographically approved
He, Z., Hewage, K. & Voigt, T. (2016). Arpeggio: a penetration attack on glossy networks. In: Proc. 13th International Conference on Sensing, Communication, and Networking: . Paper presented at SECON 2016, June 27–30, London, UK (pp. 37-45). IEEE
Open this publication in new window or tab >>Arpeggio: a penetration attack on glossy networks
2016 (English)In: Proc. 13th International Conference on Sensing, Communication, and Networking, IEEE, 2016, p. 37-45Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
IEEE, 2016
National Category
Computer Systems
Identifiers
urn:nbn:se:uu:diva-308591 (URN)10.1109/SAHCN.2016.7732971 (DOI)000392494000006 ()978-1-5090-1732-4 (ISBN)
Conference
SECON 2016, June 27–30, London, UK
Funder
VINNOVA
Available from: 2016-11-03 Created: 2016-11-28 Last updated: 2017-05-10Bibliographically approved
Hilmia, A., Hewage, K., Varshney, A., Rohner, C. & Voigt, T. (2016). Poster Abstract:BouKey: Location-Based Key Sharing Using Visible LightCommunication. In: : . Paper presented at ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN '16).
Open this publication in new window or tab >>Poster Abstract:BouKey: Location-Based Key Sharing Using Visible LightCommunication
Show others...
2016 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Visible Light Communication (VLC) is an emerging communication channel serving as a complement to traditional wireless communication. Visible light has many advantages over other communication channels like its inability to penetrate opaque objects. Securely sharing secret keys is a known problem in computer security. Sharing security keys using Radio Frequency (RF) communication is prone to sniffing attacks. In this paper, we introduce a system called BouKey which uses visible light to share keys. This makes BouKey immune to through the wall sniffing attacks. BouKey divides the key and shares it using multiple transmission bulbs allowing the key to be received in a specific area only. Our initial results show that the characteristics and height of the receiver, as well as the transmission angle play a key role in determining the shape and size of this area.

National Category
Computer Engineering
Research subject
Computer Science with specialization in Computer Communication
Identifiers
urn:nbn:se:uu:diva-287620 (URN)000381741700040 ()9781509008025 (ISBN)
Conference
ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN '16)
Available from: 2016-04-25 Created: 2016-04-25 Last updated: 2018-01-10Bibliographically approved
Hewage, K. (2016). Towards a secure synchronous communication architecture for low-power wireless networks. (Licentiate dissertation). Uppsala University
Open this publication in new window or tab >>Towards a secure synchronous communication architecture for low-power wireless networks
2016 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

The Internet of Things (IoT) is becoming the future Internet where most day-to-day devices are connected to the Internet. These devices are often resource constrained and use low-power wireless communication. Hence networks of them are called low-power and lossy networks (LLNs). LLN devices may be used in critical applications such as health care, traffic and industrial plants that concern privacy and security, thus their communication has to be protected from malicious activities. LLNs face threats at different levels ranging from transmitting bits wirelessly to applications.

In this thesis, we primarily explore LLN security issues related to application protocols and attacks that target the availability of LLNs. Particularly, we investigate compressing messages of a transport security protocol, DTLS, to make it efficient for LLNs. The IETF proposes to use DTLS for securing CoAP, a specialized web protocol for constrained devices. Furthermore, we experimentally study disrupting the communication of one of the state of the art LLN protocols, Glossy, by attacking its core mechanism.

Secondarily, we aim at improving the performance of TCP in LLNs with mobility over a reliable data link protocol. To this end, we use a Glossy-based communication protocol, LWB, as a reliable data link protocol. We plan to use the evaluation of this work as a stepping stone towards comparing the performance of secure Glossy-based communication protocols.

The main contributions of this thesis are threefold. We propose novel message compression mechanisms for DTLS messages. We also present novel attacks on Glossy, evaluate the effectiveness of them experimentally, and propose potential counter measures. Finally, we show that a reliable data link protocol can improve the performance of TCP in static and mobile settings.

Place, publisher, year, edition, pages
Uppsala University, 2016
Series
Information technology licentiate theses: Licentiate theses from the Department of Information Technology, ISSN 1404-5117 ; 2016-004
National Category
Computer Engineering Communication Systems
Research subject
Computer Science with specialization in Computer Communication
Identifiers
urn:nbn:se:uu:diva-284331 (URN)
Supervisors
Available from: 2016-02-02 Created: 2016-04-17 Last updated: 2018-01-10Bibliographically approved
Hamza, A., Keppitiyagama, C., De Zoysa, K., Iyer, V., Hewage, K. & Voigt, T. (2015). A Quadcopter Controller to Maintain Radio Link Quality. In: The First Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use: . Paper presented at DroNet '15 (pp. 21-26).
Open this publication in new window or tab >>A Quadcopter Controller to Maintain Radio Link Quality
Show others...
2015 (English)In: The First Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, 2015, p. 21-26Conference paper, Published paper (Refereed)
National Category
Computer Engineering
Research subject
Computer Science with specialization in Computer Communication
Identifiers
urn:nbn:se:uu:diva-266424 (URN)10.1145/2750675.2750678 (DOI)978-1-4503-3501-0 (ISBN)
Conference
DroNet '15
Available from: 2015-11-09 Created: 2015-11-09 Last updated: 2018-01-10
Hewage, K., Raza, S. & Voigt, T. (2015). An experimental study of attacks on the availability of Glossy. Computers & electrical engineering, 41, 115-125
Open this publication in new window or tab >>An experimental study of attacks on the availability of Glossy
2015 (English)In: Computers & electrical engineering, ISSN 0045-7906, E-ISSN 1879-0755, Vol. 41, p. 115-125Article in journal (Refereed) Published
National Category
Communication Systems
Research subject
Computer Science with specialization in Computer Communication
Identifiers
urn:nbn:se:uu:diva-252256 (URN)10.1016/j.compeleceng.2014.10.004 (DOI)000352173000011 ()
Available from: 2014-11-15 Created: 2015-05-04 Last updated: 2017-12-04
Hewage, K., Duquennoy, S., Iyer, V. & Voigt, T. (2015). Enabling TCP in mobile cyber-physical systems. In: Proc. 12th International Conference on Mobile Ad Hoc and Sensor Systems: . Paper presented at MASS 2015, October 19–22, Dallas, TX (pp. 289-297). IEEE Computer Society
Open this publication in new window or tab >>Enabling TCP in mobile cyber-physical systems
2015 (English)In: Proc. 12th International Conference on Mobile Ad Hoc and Sensor Systems, IEEE Computer Society, 2015, p. 289-297Conference paper, Published paper (Refereed)
Abstract [en]

Cyber-physical systems consist of several wirelessly connected components such as sensors that monitor physical phenomena, computational entities that make decisions based on sensed information and actuators that interact with physical processes. Connecting cyber-physical systems to the Internet using IP protocols increases interoperability by avoiding the need for protocol translation gateways. Unfortunately, in this context TCP has been disregarded since it is known to perform poorly in wireless scenarios as it treats packet loss as an indicator for network congestion rather than poor link quality. In this paper, we use the Low-power Wireless Bus (LWB) as a link layer for TCP/IP, taking advantage of its reliability and its routing-free communication. We design a system that integrates LWB with a low-power IP stack and includes TCP-aware schedulers for LWB. We evaluate our system with experiments on real hardware using uIP, a popular embedded Internet protocol stack. Our results demonstrate high TCP throughput in mobile and static scenarios and, furthermore, show that mobility does not decrease TCP performance.

Place, publisher, year, edition, pages
IEEE Computer Society, 2015
National Category
Communication Systems
Research subject
Computer Science with specialization in Computer Communication
Identifiers
urn:nbn:se:uu:diva-266412 (URN)10.1109/MASS.2015.38 (DOI)000380548300033 ()9781467391016 (ISBN)
External cooperation:
Conference
MASS 2015, October 19–22, Dallas, TX
Available from: 2015-10-22 Created: 2015-11-09 Last updated: 2016-09-15Bibliographically approved
Tennakoon, E., Madusanka, C., De Zoysa, K., Keppitiyagama, C., Iyer, V., Hewage, K. & Voigt, T. (2015). Sensor-based Breakage Detection for Electric Fences. In: Sensors Applications Symposium (SAS): . Paper presented at Sensors Applications Symposium (SAS), Zadar, Croatia, Apr 13-15, 2015 (pp. 137-140). IEEE
Open this publication in new window or tab >>Sensor-based Breakage Detection for Electric Fences
Show others...
2015 (English)In: Sensors Applications Symposium (SAS), IEEE, 2015, p. 137-140Conference paper, Published paper (Refereed)
Abstract [en]

The human-elephant conflict is one of the most severe natural problems in Sri Lanka. There are rich farmlands near the elephant habitats and elephants raid these farms in search of food. This has been the main cause for nearly 70 human deaths and over 200 elephant deaths that have been recorded each year in the recent past. To manage the problem, the government has initiated projects that secure the national wildlife parks with electric fences. However, maintaining the electric fence is a challenge, because of its large perimeter and the lack of available manpower. A particular concern is that of locating faults in electric fences since these typically span a few hundred miles. Currently, park rangers are required to travel on foot to locate the faults, which could take days to complete. In this paper, we propose a novel system architecture that considerably shortens the maintenance time for electric fences, at minimal and hence affordable cost. Our architecture benefits the park rangers of the national wildlife sanctuaries to detect and repair the breakages.

Place, publisher, year, edition, pages
IEEE: , 2015
National Category
Computer Engineering
Research subject
Computer Science with specialization in Computer Communication
Identifiers
urn:nbn:se:uu:diva-266421 (URN)10.1109/SAS.2015.7133589 (DOI)000380510800026 ()9781479961177 (ISBN)
Conference
Sensors Applications Symposium (SAS), Zadar, Croatia, Apr 13-15, 2015
Available from: 2015-11-09 Created: 2015-11-09 Last updated: 2018-01-10Bibliographically approved
Elvitigala, C., Tennakoon, E., Hamza, A., Lokuge, Y., De Zoysa, K., Keppitiyagama, C., . . . Voigt, T. (2015). Towards a sensor system to tame the human elephant conflict. In: Sensors Applications Symposium (SAS): . Paper presented at Sensors Applications Symposium (SAS), Zadar, Croatia, Apr 13-15, 2015 (pp. 169-172). IEEE
Open this publication in new window or tab >>Towards a sensor system to tame the human elephant conflict
Show others...
2015 (English)In: Sensors Applications Symposium (SAS), IEEE, 2015, p. 169-172Conference paper, Published paper (Refereed)
Abstract [en]

The human elephant conflict in Sri Lanka has been a cause of major concern over the past decade. Frequent clashes between wild elephants and villagers have resulted in severe damage to property, as well as loss of lives for both humans and elephants. Competition for space is the primary reason for conflict between humans and elephants. Elephants that escape from the wildlife national parks venture into villages creating destruction in their wake. To prevent such mishaps, a proper system is required to contain and monitor elephants in national parks. In this paper, we describe different approaches to detect elephants and possible ways of monitoring the national wildlife parks. We also elaborate on the advantages and limitations of each approach, and determine what sort of system is needed to tame the human elephant conflict.

Place, publisher, year, edition, pages
IEEE: , 2015
National Category
Computer Engineering
Research subject
Computer Science with specialization in Computer Communication
Identifiers
urn:nbn:se:uu:diva-266422 (URN)10.1109/SAS.2015.7133595 (DOI)000380510800032 ()9781479961177 (ISBN)
Conference
Sensors Applications Symposium (SAS), Zadar, Croatia, Apr 13-15, 2015
Available from: 2015-11-09 Created: 2015-11-09 Last updated: 2018-01-10Bibliographically approved
Organisations

Search in DiVA

Show all publications