Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








41 Hits in 6.8 sec

Full Frame Encryption and Modulation Using Friendly CryptoJam Scheme

2017 International Journal of Recent Trends in Engineering and Research  
preamble and overlays a frame-specific identifier on it.  ...  This security problem is present even when frame headers and payloads can be encrypted.  ...  Our intermixing method makes FCJ a form of modulation-level encryption (for the whole frame) and also a form of modulation obfuscation (for the PHY-layer payload).  ... 
doi:10.23883/ijrter.2017.3346.4id46 fatcat:bnc4sr3hgfhfje3di7cgp5cv5m

Design of an OFDM Physical Layer Encryption Scheme

Junqing Zhang, Alan Marshall, Roger Woods, Trung Q. Duong
2017 IEEE Transactions on Vehicular Technology  
and channel estimation of legitimate users while preventing eavesdroppers from performing these functions.  ...  The new scheme obfuscates the subcarriers by randomly reserving several subcarriers for dummy data and resequences the training symbol by a new secure sequence.  ...  Finally, training symbol resequencing is independent of subcarrier obfuscation and can be implemented with other data part protection schemes such as modulation symbols rotation-based schemes and scrambling-based  ... 
doi:10.1109/tvt.2016.2571264 fatcat:vxbbjot7j5gvxi435tmidhkmqe

Considerations, Advances, and Challenges Associated with the Use of Specific Emitter Identification in the Security of Internet of Things Deployments: A Survey

Joshua H. Tyler, Mohamed K. M. Fadul, Donald R. Reising
2023 Information  
This attention is largely due to SEI's demonstrated success in passively and uniquely identifying wireless emitters using traditional machine learning and the success of Deep Learning (DL) within the natural  ...  Although sufficient to facilitate SEI, these features do not hinder normal operations such as detection, channel estimation, timing, and demodulation.  ...  Acknowledgments: The views, analysis, and conclusions presented in this article are those of the authors and should not be interpreted or construed as representing the official policies-expressed or implied-of  ... 
doi:10.3390/info14090479 fatcat:qgyn7zlby5b4fhuda25bgwi6mu

LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review

Henri Ruotsalainen, Guanxiong Shen, Junqing Zhang, Radek Fujdiak
2022 Sensors  
Afterwards, we discuss the impact of the reviewed topics on LoRaWAN security and, subsequently, we identify research gaps as well as promising future research directions.  ...  ., detection methods for wireless attacks improve the integrity and robustness of LoRaWAN access.  ...  The packets are then preprocessed for RFFI, including carrier frequency offset (CFO) compensation, preamble extraction and conversion to channel-independent spectrograms.  ... 
doi:10.3390/s22093127 pmid:35590817 pmcid:PMC9100101 fatcat:jzbtt3a5ifd75dqeilyaonjvli

LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation

Frank Hessel, Lars Almon, Matthias Hollick
2022 ACM transactions on sensor networks  
We survey LoRaWAN security and follow a systematic and evolvable approach that can be dynamically updated.  ...  The changing vulnerability and threat landscape constantly challenge the security of wireless communication standards and protocols.  ...  Tables summarizing the security of the protocol are generated automatically, and graphs have been created using interactive tool support.  ... 
doi:10.1145/3561973 fatcat:zpuopghu7zge3c5cgqtxcsgrd4

Lockpicking physical layer key exchange

Daniel Steinmetzer, Matthias Schulz, Matthias Hollick
2015 Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks - WiSec '15  
Using simulation and real-world software-defined radio (SDR) experimentation, we quantify the impact of increasingly strong adversaries.  ...  We argue that these assumptions are perilous and 'invite the thief'.  ...  Although different modulations require adjustments, the performance of our detection scheme remains independent from the modulation.  ... 
doi:10.1145/2766498.2766514 dblp:conf/wisec/SteinmetzerSH15 fatcat:sqm6uccx3bhgzjfglpsdd6opjy

On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them

Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, Bart Preneel
2016 Proceedings of the 32nd Annual Conference on Computer Security Applications - ACSAC '16  
communicate over a long-range RF channel (from two to five meters).  ...  For this we follow a black-box reverse-engineering approach and use inexpensive Commercial Off-The-Shelf (COTS) equipment.  ...  This work was supported in part by the Research Council KU Leuven: C16/15/058 and the Cryptacus COST Action IC1403.  ... 
doi:10.1145/2991079.2991094 fatcat:kj6g2imurjhdvnuz6crrokgkma

Spectrum-Flexible Secure Broadcast Ranging [article]

Tien D. Vo-Huu, Triet D. Vo-Huu, Guevara Noubir
2020 arXiv   pre-print
The protocol design, and cryptographically generated/detected signals, and randomized timing of transmissions, provide stealth and security against denial of service, sniffing, and distance manipulation  ...  We exploit a set of RF techniques such as upsampling and successive interference cancellation to achieve high accuracy and scalability to tens of reflectors even when operating over narrow bands of spectrum  ...  Using public preamble is, in fact, the typical design of today's existing communication systems for the purpose of signal synchronization and channel estimation.  ... 
arXiv:2010.08901v2 fatcat:zegbn5scbjgrxnpux2cxnvqyne

A review of mobile location privacy in the Internet of Things

Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung
2012 2012 Tenth International Conference on ICT and Knowledge Engineering  
The Privacy Module (PM), which consists of a Context Analysis Component, Privacy Manager Component, and Semantic Obfuscation Component, enables the user to alter the location of things and to control the  ...  For instance, using "Obfuscation level 3", it is found that the S-Obfuscation has produced better-obscured location by 60% than that of the Dispersion technique and by 50% than that of the Rand technique  ...  The Managerial Components  AgentID is an identifier used to identify agents. This AgentID is assigned by the manager. The MTID and AgentID are used to identify an MT.  ... 
doi:10.1109/ictke.2012.6408566 fatcat:wft2ncw77ffn3acwffbyua6bry

SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol [article]

Pietro Tedeschi, Spiridon Bakiras, Roberto Di Pietro
2021 arXiv   pre-print
First, we present an in-depth analysis of the security and privacy characteristics of the most prominent contact tracing protocols, under both passive and active adversaries.  ...  and privacy guarantees that are necessary for such a sensitive application.  ...  The information and views set out in this publication are those of the authors and do not necessarily reflect the official opinion of the QNRF.  ... 
arXiv:2011.07306v2 fatcat:a52yn45kf5cwhcjalnvk7irh4y

VoIP: A comprehensive survey on a promising technology

Stylianos Karapantazis, Fotini-Niovi Pavlidou
2009 Computer Networks  
Beginning more as a frolic among computer enthusiasts, VoIP has set off a feeding frenzy in both the industrial and scientific communities and has the potential to radically change telephone communications  ...  The survey begins with the merits and demerits of VoIP, followed by the Quality of Service (QoS) requirements that voice imposes and a description of test methods for the assessment of speech quality.  ...  The algorithm is based on transform technology, using a Modulated Lapped Transform (MLT), and operates on 20 ms frames of audio.  ... 
doi:10.1016/j.comnet.2009.03.010 fatcat:yqjfs3vtard3loixoz3fvndhgy

Sensor Networks for High-Confidence Cyber-Physical Systems

Feng Xia, Tridib Mukherjee, Yan Zhang, Ye-Qiong Song
2011 International Journal of Distributed Sensor Networks  
In the paper "Link prediction and route selection based on channel state detection in UASNs," J.  ...  secure in-network data aggregation by making it difficult for an adversary to identify and then physically disable the designated aggregator nodes.  ...  The authors are thankful to the anonymous reviewers for their useful comments and suggestions that helped to improve the quality of this paper.  ... 
doi:10.1155/2011/245734 fatcat:lswungc2orda5pcqvpyqu7vrna

Privacy Management of Multi User Environment in Online Social Networks (OSNs)

P. Amrutha
2013 IOSR Journal of Computer Engineering  
Online Social Networks (OSNs) are inherently designed to enable people to share personal and public information and make social connections with others.  ...  These OSNs provides digital social interactions and social as well as personal information sharing, but in sharing a number of security and privacy problems raised.  ...  Leena Ragha, Head of the Department of Computer Engineering, Ramrao Adik Institute of Technology and Prof.  ... 
doi:10.9790/0661-1320107 fatcat:rdpsdcqelbbzvkg5rm4og4tzba

Semantics-Empowered Communication: A Tutorial-cum-Survey [article]

Zhilin Lu, Rongpeng Li, Kun Lu, Xianfu Chen, Ekram Hossain, Zhifeng Zhao, Honggang Zhang
2023 arXiv   pre-print
Furthermore, we propose to categorize the critical enabling techniques by explicit and implicit reasoning-based methods, and elaborate on how they evolve and contribute to modern content & channel semantics-empowered  ...  ., theories, applications, metrics and implementations) in both academia and industry.  ...  Mean- while, the authors extend this idea towards continuous data transmission entailing the synchronization issue by introducing a DNN-based frame synchronization module.  ... 
arXiv:2212.08487v5 fatcat:kubt5kreyff6tm6gxl6wngqwti

Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin [article]

Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He
2022 arXiv   pre-print
The survey is expected to help developers break knowledge barriers among smart grid, cybersecurity, and DT, and provide guidelines for future security design of DT-based smart grid.  ...  This is due to the knowledge barriers among smart grid designers, security experts, and DT developers. Each single domain is a complicated system covering various components and technologies.  ...  ACKNOWLEDGMENT We appreciate the support of the National Key R&D Program of China under Grants No. 2020YFB1807500, No. 2020YFB1807504, and National Science Foundation of China Key Project under Grants  ... 
arXiv:2205.11783v1 fatcat:fz43u2e6g5gyfepqz44tezelba
« Previous Showing results 1 — 15 out of 41 results