|
|
|
Mona Alkanhal, Abdulaziz Alali and Mohamed Younis
In recent times, the advent of innovative technological paradigms like the Internet of Things has paved the way for numerous applications that enhance the quality of human life. A remarkable application of IoT that has emerged is the Internet of Vehicles...
ver más
|
|
|
|
|
|
|
Darja Cirjulina, Ruslans Babajans, Filips Capligins, Deniss Kolosovs and Anna Litvinenko
This manuscript presents an experimental study of Quadrature Chaos Shift Keying (QCSK) as a means to tighten the physical layer security of Internet of Things (IoT) communication. Our study examines the characteristics and operational aspects of chaos os...
ver más
|
|
|
|
|
|
|
Ruslans Babajans, Darja Cirjulina, Filips Capligins, Deniss Kolosovs and Anna Litvinenko
The current work is focused on studying the performance of the Pecora?Carroll synchronization technique to achieve synchronization between the analog and discrete chaos oscillators. The importance of this study is supported by the growing applications of...
ver más
|
|
|
|
|
|
|
Ted H. Szymanski
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi...
ver más
|
|
|
|
|
|
|
Jawhara Boodai, Aminah Alqahtani and Mounir Frikha
Fifth generation (5G) wireless networks promise to revolutionize the way we communicate and connect to the internet. However, as with any new technology, 5G networks also bring new security challenges that need to be addressed. One of the key areas of co...
ver más
|
|
|
|
|
|
|
Joshua H. Tyler, Mohamed K. M. Fadul and Donald R. Reising
Initially introduced almost thirty years ago for the express purpose of providing electronic warfare systems the capabilities to detect, characterize, and identify radar emitters, Specific Emitter Identification (SEI) has recently received a lot of atten...
ver más
|
|
|
|
|
|
|
Dechuan Chen, Jin Li, Jianwei Hu, Xingang Zhang and Shuai Zhang
In this work, we exploit a multi-antenna cooperative jammer to enable secure short packet communications in Internet of Things (IoT) networks. Specifically, we propose three jamming schemes to combat eavesdropping, i.e., the zero forcing beamforming (ZFB...
ver más
|
|
|
|
|
|
|
Dania Marabissi, Lorenzo Mucchi and Andrea Stomaci
The wide variety of services and applications that shall be supported by future wireless systems will lead to a high amount of sensitive data exchanged via radio, thus introducing a significant challenge for security. Moreover, in new networking paradigm...
ver más
|
|
|
|
|
|
|
Ziwei Yuan, Yanping Yang, Dong Wang and Xiaoping Ma
Low-altitude cellular-enabled Unmanned Aerial Vehicles (UAVs) provide potential supplementary platforms to assist air-to-ground cooperative communication. This paper investigates a joint safety information interaction scheme for a UAV-enabled network, wh...
ver más
|
|
|
|
|
|
|
Yuan Ren, Yixuan Tan, Meruyert Makhanbet and Xuewei Zhang
Non-orthogonal multiple access (NOMA) and wireless energy harvesting are two promising technologies for improving spectral efficiency and energy efficiency, respectively. In this paper, we study the physical layer security of a wireless-powered full-dupl...
ver más
|
|
|
|