A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Full Frame Encryption and Modulation Using Friendly CryptoJam Scheme
2017
International Journal of Recent Trends in Engineering and Research
preamble and overlays a frame-specific identifier on it. ...
This security problem is present even when frame headers and payloads can be encrypted. ...
Our intermixing method makes FCJ a form of modulation-level encryption (for the whole frame) and also a form of modulation obfuscation (for the PHY-layer payload). ...
doi:10.23883/ijrter.2017.3346.4id46
fatcat:bnc4sr3hgfhfje3di7cgp5cv5m
Design of an OFDM Physical Layer Encryption Scheme
2017
IEEE Transactions on Vehicular Technology
and channel estimation of legitimate users while preventing eavesdroppers from performing these functions. ...
The new scheme obfuscates the subcarriers by randomly reserving several subcarriers for dummy data and resequences the training symbol by a new secure sequence. ...
Finally, training symbol resequencing is independent of subcarrier obfuscation and can be implemented with other data part protection schemes such as modulation symbols rotation-based schemes and scrambling-based ...
doi:10.1109/tvt.2016.2571264
fatcat:vxbbjot7j5gvxi435tmidhkmqe
Considerations, Advances, and Challenges Associated with the Use of Specific Emitter Identification in the Security of Internet of Things Deployments: A Survey
2023
Information
This attention is largely due to SEI's demonstrated success in passively and uniquely identifying wireless emitters using traditional machine learning and the success of Deep Learning (DL) within the natural ...
Although sufficient to facilitate SEI, these features do not hinder normal operations such as detection, channel estimation, timing, and demodulation. ...
Acknowledgments: The views, analysis, and conclusions presented in this article are those of the authors and should not be interpreted or construed as representing the official policies-expressed or implied-of ...
doi:10.3390/info14090479
fatcat:qgyn7zlby5b4fhuda25bgwi6mu
LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review
2022
Sensors
Afterwards, we discuss the impact of the reviewed topics on LoRaWAN security and, subsequently, we identify research gaps as well as promising future research directions. ...
., detection methods for wireless attacks improve the integrity and robustness of LoRaWAN access. ...
The packets are then preprocessed for RFFI, including carrier frequency offset (CFO) compensation, preamble extraction and conversion to channel-independent spectrograms. ...
doi:10.3390/s22093127
pmid:35590817
pmcid:PMC9100101
fatcat:jzbtt3a5ifd75dqeilyaonjvli
LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation
2022
ACM transactions on sensor networks
We survey LoRaWAN security and follow a systematic and evolvable approach that can be dynamically updated. ...
The changing vulnerability and threat landscape constantly challenge the security of wireless communication standards and protocols. ...
Tables summarizing the security of the protocol are generated automatically, and graphs have been created using interactive tool support. ...
doi:10.1145/3561973
fatcat:zpuopghu7zge3c5cgqtxcsgrd4
Lockpicking physical layer key exchange
2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks - WiSec '15
Using simulation and real-world software-defined radio (SDR) experimentation, we quantify the impact of increasingly strong adversaries. ...
We argue that these assumptions are perilous and 'invite the thief'. ...
Although different modulations require adjustments, the performance of our detection scheme remains independent from the modulation. ...
doi:10.1145/2766498.2766514
dblp:conf/wisec/SteinmetzerSH15
fatcat:sqm6uccx3bhgzjfglpsdd6opjy
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them
2016
Proceedings of the 32nd Annual Conference on Computer Security Applications - ACSAC '16
communicate over a long-range RF channel (from two to five meters). ...
For this we follow a black-box reverse-engineering approach and use inexpensive Commercial Off-The-Shelf (COTS) equipment. ...
This work was supported in part by the Research Council KU Leuven: C16/15/058 and the Cryptacus COST Action IC1403. ...
doi:10.1145/2991079.2991094
fatcat:kj6g2imurjhdvnuz6crrokgkma
Spectrum-Flexible Secure Broadcast Ranging
[article]
2020
arXiv
pre-print
The protocol design, and cryptographically generated/detected signals, and randomized timing of transmissions, provide stealth and security against denial of service, sniffing, and distance manipulation ...
We exploit a set of RF techniques such as upsampling and successive interference cancellation to achieve high accuracy and scalability to tens of reflectors even when operating over narrow bands of spectrum ...
Using public preamble is, in fact, the typical design of today's existing communication systems for the purpose of signal synchronization and channel estimation. ...
arXiv:2010.08901v2
fatcat:zegbn5scbjgrxnpux2cxnvqyne
A review of mobile location privacy in the Internet of Things
2012
2012 Tenth International Conference on ICT and Knowledge Engineering
The Privacy Module (PM), which consists of a Context Analysis Component, Privacy Manager Component, and Semantic Obfuscation Component, enables the user to alter the location of things and to control the ...
For instance, using "Obfuscation level 3", it is found that the S-Obfuscation has produced better-obscured location by 60% than that of the Dispersion technique and by 50% than that of the Rand technique ...
The Managerial Components AgentID is an identifier used to identify agents. This AgentID is assigned by the manager. The MTID and AgentID are used to identify an MT. ...
doi:10.1109/ictke.2012.6408566
fatcat:wft2ncw77ffn3acwffbyua6bry
SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol
[article]
2021
arXiv
pre-print
First, we present an in-depth analysis of the security and privacy characteristics of the most prominent contact tracing protocols, under both passive and active adversaries. ...
and privacy guarantees that are necessary for such a sensitive application. ...
The information and views set out in this publication are those of the authors and do not necessarily reflect the official opinion of the QNRF. ...
arXiv:2011.07306v2
fatcat:a52yn45kf5cwhcjalnvk7irh4y
VoIP: A comprehensive survey on a promising technology
2009
Computer Networks
Beginning more as a frolic among computer enthusiasts, VoIP has set off a feeding frenzy in both the industrial and scientific communities and has the potential to radically change telephone communications ...
The survey begins with the merits and demerits of VoIP, followed by the Quality of Service (QoS) requirements that voice imposes and a description of test methods for the assessment of speech quality. ...
The algorithm is based on transform technology, using a Modulated Lapped Transform (MLT), and operates on 20 ms frames of audio. ...
doi:10.1016/j.comnet.2009.03.010
fatcat:yqjfs3vtard3loixoz3fvndhgy
Sensor Networks for High-Confidence Cyber-Physical Systems
2011
International Journal of Distributed Sensor Networks
In the paper "Link prediction and route selection based on channel state detection in UASNs," J. ...
secure in-network data aggregation by making it difficult for an adversary to identify and then physically disable the designated aggregator nodes. ...
The authors are thankful to the anonymous reviewers for their useful comments and suggestions that helped to improve the quality of this paper. ...
doi:10.1155/2011/245734
fatcat:lswungc2orda5pcqvpyqu7vrna
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
2013
IOSR Journal of Computer Engineering
Online Social Networks (OSNs) are inherently designed to enable people to share personal and public information and make social connections with others. ...
These OSNs provides digital social interactions and social as well as personal information sharing, but in sharing a number of security and privacy problems raised. ...
Leena Ragha, Head of the Department of Computer Engineering, Ramrao Adik Institute of Technology and Prof. ...
doi:10.9790/0661-1320107
fatcat:rdpsdcqelbbzvkg5rm4og4tzba
Semantics-Empowered Communication: A Tutorial-cum-Survey
[article]
2023
arXiv
pre-print
Furthermore, we propose to categorize the critical enabling techniques by explicit and implicit reasoning-based methods, and elaborate on how they evolve and contribute to modern content & channel semantics-empowered ...
., theories, applications, metrics and implementations) in both academia and industry. ...
Mean- while, the authors extend this idea towards continuous data transmission entailing the synchronization issue by introducing a DNN-based frame synchronization module. ...
arXiv:2212.08487v5
fatcat:kubt5kreyff6tm6gxl6wngqwti
Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin
[article]
2022
arXiv
pre-print
The survey is expected to help developers break knowledge barriers among smart grid, cybersecurity, and DT, and provide guidelines for future security design of DT-based smart grid. ...
This is due to the knowledge barriers among smart grid designers, security experts, and DT developers. Each single domain is a complicated system covering various components and technologies. ...
ACKNOWLEDGMENT We appreciate the support of the National Key R&D Program of China under Grants No. 2020YFB1807500, No. 2020YFB1807504, and National Science Foundation of China Key Project under Grants ...
arXiv:2205.11783v1
fatcat:fz43u2e6g5gyfepqz44tezelba
« Previous
Showing results 1 — 15 out of 41 results