Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








17 Hits in 5.9 sec

Robust CDMA receiver design under disguised jamming

Kai Zhou, Tianlong Song, Jian Ren, Tongtong Li
2016 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
-Under disguised jamming, the deterministic capacity of a CDMA system without secure scrambling is zero!!!  ...  Conclusions • We designed a novel CDMA receiver that is robust against disguised jamming; • We developed a secure scrambling scheme to combat disguised jamming in CDMA systems; • We proved that the capacity  ... 
doi:10.1109/icassp.2016.7472063 dblp:conf/icassp/ZhouSRL16 fatcat:zb6w2tycybhq3mnj5aluirt7aa

The Origins of Spread-Spectrum Communications

R. Scholtz
1982 IEEE Transactions on Communications  
The WHYN, Hush-Up, BLADES, F9C-A/Rake, CODORAC, and ARC-SO systems are featured, along with a description of the prior art in secure communications, and introductions to other early spreadspectrum communication  ...  Abstrucz-This monograph reviews events, circa 1920-1960, leading to the development of spread-spectrum communication systems.  ...  Published at the same time as Basore's thesis, Pankowski's work details several ideas concerning jamming, multiplexing, and CDMA operation of TR-NOMAC systems.  ... 
doi:10.1109/tcom.1982.1095547 fatcat:dnq6cqgmvrf7baf2wtvmrevmn4

2013 Index

2014 IEEE Transactions on Wireless Communications  
The Subject Index contains entries describing the item under all appropriate subject headings, plus the first author's name, the publication abbreviation, month, and year, and inclusive pages.  ...  Departments and other items may also be covered if they have been judged to have archival value. The Author Index contains the primary entry for each item, listed under the first author's name.  ...  Zhang, Lei, +, TWC January 2013 70-79 Anti-Jamming Message-Driven Frequency Hopping-Part II: Capacity Analysis Under Disguised Jamming.  ... 
doi:10.1109/twc.2011.09.499-tw1401-index fatcat:w5ya5mg3sbcodb2crtuaoyk3su

Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges [article]

Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro
2022 arXiv   pre-print
Satellite-based Communication systems are gaining renewed momentum in Industry and Academia, thanks to innovative services introduced by leading tech companies and the promising impact they can deliver  ...  the identified branches, focusing on dedicated security issues, including, e.g., physical-layer confidentiality, anti-jamming schemes, anti-spoofing strategies, and quantum-based key distribution schemes  ...  Table 6 : 6 Comparison of anti-jamming techniques and related system requirements. No Ref.  ... 
arXiv:2112.11324v4 fatcat:em7bfwxg7bdvzcjkyc5aydiena

Evaluating the Security of Open Radio Access Networks [article]

Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai
2022 arXiv   pre-print
Within the security analysis, we provide a detailed overview of the O-RAN architecture; present an ontology for evaluating the security of a system, which is currently at an early development stage; detect  ...  Specifically, we review the architectural blueprint designed by the O-RAN alliance -- A leading force in the cellular ecosystem.  ...  Li, “Analysis of mimo band- tacks in wireless networks,” in 2017 International Multi-Conference limited ds-cdma systems in the presence of multitone jamming on Engineering  ... 
arXiv:2201.06080v1 fatcat:tqroywb3qvfp5mbgqbg6clmava

Security and privacy in 6G networks: new areas and new challenges

Minghao Wang, Tianqing Zhu, Tao Zhang, Jun Zhang, Shui Yu, Wanlei Zhou
2020 Digital Communications and Networks  
, connected robotics and autonomous systems, wireless brain-computer interactions, and blockchain and distributed ledger technologies.  ...  The connected robotics and autonomous systems typically rely on the AI and the VLC technology where malicious behavior, encryption and data transmission can be problematic.  ...  modulation techniques, such as Time Division Multiple Access (TDMA) and Code Division Multiple Access (CDMA), which can support both voice and short message services.  ... 
doi:10.1016/j.dcan.2020.07.003 fatcat:5rn6nc3c4rdopaj5jtqgqihkrq

Supercommons: Toward a Unified Theory of Wireless Communication

Kevin D. Werbach
2003 Social Science Research Network  
Critics of government spectrum licensing advance two alternatives: exclusive property rights and unlicensed sharing through "spectrum commons."  ...  The federal government has long controlled the allocation and assignment of electromagnetic spectrum, considered the lifeblood of wireless communication.  ...  Such constraints on simultaneous usage as do exist are a complicated function of system design, equipment capacity, and application robustness.  ... 
doi:10.2139/ssrn.456020 fatcat:atvjqmoozbb5lpupj63lnb2ace

Survey on Multi-Access Edge Computing Security and Privacy

Pasika Ranaweera, Anca Delia Jurcut, Madhusanka Liyanage
2021 IEEE Communications Surveys and Tutorials  
static/dynamic malware analysis and anomaly detection in the current information systems [192] .  ...  These intentions are vital for designing and optimizing networking and communication scenarios in emerging systems.  ... 
doi:10.1109/comst.2021.3062546 fatcat:u3xxvixiw5a4fdl2wxdla24ocu

DSSS-Based Flow Marking Technique for Invisible Traceback

Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao
2007 2007 IEEE Symposium on Security and Privacy (SP '07)  
We demonstrate a practical flow marking system which requires no training, and can achieve both high detection and low false positive rates.  ...  Using a combination of analytical modeling, simulations, and experiments on Tor (a popular Internet anonymous communication system), we demonstrate the effectiveness of the DSSS-based flow mark- * In this  ...  Spread spectrum techniques are often used in code division multiple access (CDMA) systems.  ... 
doi:10.1109/sp.2007.14 dblp:conf/sp/YuFGXZ07 fatcat:5yy323njizf3bo3cqcxf6rjpty

Mobile Phone Sensing Systems: A Survey

Wazir Zada Khan, Yang Xiang, Mohammed Y Aalsalem, Quratulain Arshad
2013 IEEE Communications Surveys and Tutorials  
, sensor augmented gaming, virtual reality and smart transportation systems.  ...  In this paper we have described comprehensively all those systems which are using smart phones and mobile phone sensors for humans good will and better human phone interaction.  ...  ACKNOWLEDGMENT The authors wish to acknowledge the anonymous reviewers for their valuable comments and special thanks to Jun Zhang & Chao Chen (Deakin University) for helping to prepare this manuscripts  ... 
doi:10.1109/surv.2012.031412.00077 fatcat:vbktgtrkqvc6zdnr2qqqclr7am

FUNDAMENTAL OF ADHOC AND SENSOR NETWORK [article]

Dr. Jasleen Kaur, Dr. Balkar Singh, Dr. Anuj Kumar, Dr. Ram Paul
2024 Zenodo  
FUNDAMENTAL OF ADHOC AND SENSOR NETWORK  ...  This is accomplished through the design and analysis of the interaction.  ...  In order to generate interference making use of a frequency hopping system, it is essential to jam the whole band.  ... 
doi:10.5281/zenodo.10685058 fatcat:wus2i347ynbpdn7lowb2ym2b6u

Sensor deception detection and radio-frequency emitter localization [article]

Jahshan Ahmed Bhatti
2015
A.1 Worst-case fault profile for one-dimensional ship dynamics using two-norm and minimax innovation heuristics.  ...  A covert attack is designed to have a high integrity risk and is possible because attacker-induced deviations in the vessel's dynamics can be disguised as the effects of slowly-changing ocean currents  ...  To aid in enforcing laws against PPDs and jamming devices, there is a need for a persistent system capable of detecting and locating sources of jamming.  ... 
doi:10.15781/t2m35k fatcat:zm5njdpdured7dmvar5micbusm

Threat vector analysis in autonomous driving [article]

Σπυρίδων Καμινιάρης, University Of Thessaly, Γεώργιος Σταμούλης
2022
and analysis.  ...  to their systems design.  ...  Apple CarPlay: Is Apple's standard that enables the connection and interaction between an iOS device and an infotainment system on a vehicle.  ... 
doi:10.26253/heal.uth.14540 fatcat:5a3jnpgco5eudhefhhrkteygk4

CYBER 2016 The First International Conference on Cyber-Technologies and Cyber-Systems CYBER 2016 Committee CYBER Advisory Committee CYBER 2016 Technical Program Committee

Thomas Klemas, Rainer Falk, Syed Naqvi, Thomas Klemas, Rainer Falk, A Siemens, Germany Yao, Yiping, Steve Chan, Jiankun Hu, Carla Westphall, Syed Naqvi (+55 others)
2016 The First International Conference on Advances in Cyber-Technologies and Cyber-Systems (CYBER 2016), held between October 9 and 13   unpublished
Some of new solutions are nature-inspired and social-inspired leading to self-secure and self-defending systems.  ...  It was also intended to illustrate appropriate current academic and industry cyber-system projects, prototypes, and deployed products and services.  ...  ACKNOWLEDGMENT The authors would like to thank the SimSpace corporation for presenting us with the opportunity and means to conduct this research and solve this difficult problem and the leadership for  ... 
fatcat:du4jikwafzf4fnvx2stgp44oxa

Detection of Smartphone Malware [article]

Aubrey-Derrick Schmidt, Technische Universität Berlin, Technische Universität Berlin, Sahin Albayrak
2011
We introduce the fields of dynamic and static analysis.  ...  In the field of dynamic analysis, a monitoring system is introduced gathering behavior and system-based information that are processed by a remote system using machine learning for anomaly detection.  ...  services like SMS 8 . • GPRS in combination with 2G is often described as 2.5G, as it provides voice and packet data. • W-CDMA 9 was designed as replacement of GSM and is used in the FOMA system in Japan  ... 
doi:10.14279/depositonce-2885 fatcat:fzfwv6ktwzfaxm6xizimhvbiea
« Previous Showing results 1 — 15 out of 17 results