|
|
|
Joshua H. Tyler, Mohamed K. M. Fadul and Donald R. Reising
Initially introduced almost thirty years ago for the express purpose of providing electronic warfare systems the capabilities to detect, characterize, and identify radar emitters, Specific Emitter Identification (SEI) has recently received a lot of atten...
ver más
|
|
|
|
|
|
|
Dechuan Chen, Jin Li, Jianwei Hu, Xingang Zhang and Shuai Zhang
In this work, we exploit a multi-antenna cooperative jammer to enable secure short packet communications in Internet of Things (IoT) networks. Specifically, we propose three jamming schemes to combat eavesdropping, i.e., the zero forcing beamforming (ZFB...
ver más
|
|
|
|
|
|
|
Jawhara Boodai, Aminah Alqahtani and Mounir Frikha
Fifth generation (5G) wireless networks promise to revolutionize the way we communicate and connect to the internet. However, as with any new technology, 5G networks also bring new security challenges that need to be addressed. One of the key areas of co...
ver más
|
|
|
|
|
|
|
Ziwei Yuan, Yanping Yang, Dong Wang and Xiaoping Ma
Low-altitude cellular-enabled Unmanned Aerial Vehicles (UAVs) provide potential supplementary platforms to assist air-to-ground cooperative communication. This paper investigates a joint safety information interaction scheme for a UAV-enabled network, wh...
ver más
|
|
|
|
|
|
|
Dania Marabissi, Lorenzo Mucchi and Andrea Stomaci
The wide variety of services and applications that shall be supported by future wireless systems will lead to a high amount of sensitive data exchanged via radio, thus introducing a significant challenge for security. Moreover, in new networking paradigm...
ver más
|
|
|
|
|
|
|
Yuan Ren, Yixuan Tan, Meruyert Makhanbet and Xuewei Zhang
Non-orthogonal multiple access (NOMA) and wireless energy harvesting are two promising technologies for improving spectral efficiency and energy efficiency, respectively. In this paper, we study the physical layer security of a wireless-powered full-dupl...
ver más
|
|
|
|
|
|
|
Deemah Tashman and Walaa Hamouda
In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is communicating with a legitimate receiver. The channels are assumed to be followi...
ver más
|
|
|
|
|
|
|
Xin Song, Lin Xia, Siyang Xu and Yue Wang
In this paper, the secure communication based on the full-duplex (FD) device-to-device (D2D) in cellular networks is proposed. For the proposed scheme, the novel model is established, in which a D2D user is played as a relay operating in FD mode to assis...
ver más
|
|
|
|
|
|
|
Zhihui Shang, Tao Zhang, Yueming Cai, Weiwei Yang, Hao Wu, Yu Zhang and Liwei Tao
This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), while t...
ver más
|
|
|
|
|
|
|
Vlastimil Clupek, Tomas Horvath, Petr Munster and Vaclav Oujezsky
Passive optical networks are currently the most promising solution for access networks. These networks rely on broadcast signal distribution in the downstream direction and unicast signal transmission in the upstream direction. The upstream direction is ...
ver más
|
|
|
|
|
|
|
Tommaso Pecorella, Luca Brilli and Lorenzo Mucchi
-
|
|
|
|
|
|
|
Mona Alkanhal, Abdulaziz Alali and Mohamed Younis
In recent times, the advent of innovative technological paradigms like the Internet of Things has paved the way for numerous applications that enhance the quality of human life. A remarkable application of IoT that has emerged is the Internet of Vehicles...
ver más
|
|
|
|
|
|
|
Dandan Guo, Baogang Li and Wei Zhao
In this paper, a new approach is proposed to solve the constrained optimization problem of saving grid energy and increasing safety in a simultaneous wireless information and power transfer (SWIPT) system. The traditional grid energy is combined with the...
ver más
|
|
|
|
|
|
|
Dandan Guo, Baogang Li and Wei Zhao
-
|
|
|
|
|
|
|
A. R. Al-Ali, Ragini Gupta, Tasneem Zaman Batool, Taha Landolsi, Fadi Aloul and Ahmad Al Nabulsi
As the Internet of Things (IoT) is gaining ground and becoming increasingly popular in smart city applications such as smart energy, smart buildings, smart factories, smart transportation, smart farming, and smart healthcare, the digital twin concept is ...
ver más
|
|
|
|
|
|
|
Darja Cirjulina, Ruslans Babajans, Filips Capligins, Deniss Kolosovs and Anna Litvinenko
This manuscript presents an experimental study of Quadrature Chaos Shift Keying (QCSK) as a means to tighten the physical layer security of Internet of Things (IoT) communication. Our study examines the characteristics and operational aspects of chaos os...
ver más
|
|
|
|
|
|
|
Yehia R Hamdy,Ahmed I Alghannam
Pág. 254 - 259
ZigBee is widely used wireless network in Internet of Things (IoT) applications to remotely sensor and automation due to its unique characteristics compared to other wireless networks. According to ZigBee classification of IEEE 802.15.4 standard, the net...
ver más
|
|
|
|
|
|
|
Abdullah Al Hayajneh, Md Zakirul Alam Bhuiyan and Ian McAndrew
This paper builds upon the foundation and clarifies specifications for a necessary security protocol in Wireless Sensor Networks (WSNs) with cooperative communications. It is designed to enhance performance and resiliency against cyber-attacks. Recent li...
ver más
|
|
|
|
|
|
|
Ted H. Szymanski
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi...
ver más
|
|
|
|
|
|
|
Ruslans Babajans, Darja Cirjulina, Filips Capligins, Deniss Kolosovs and Anna Litvinenko
The current work is focused on studying the performance of the Pecora?Carroll synchronization technique to achieve synchronization between the analog and discrete chaos oscillators. The importance of this study is supported by the growing applications of...
ver más
|
|
|
|