Zobrazeno 1 - 10
of 58
pro vyhledávání: '"Birnbach, S"'
Despite their substantially different purposes, a common issue both for many legacy data links and many onboard data buses used in aviation is a lack of authentication and thus a vulnerability to spoofing and message manipulation attacks. This proble
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1064::5b7a163f46d4a155639e5492d8bb8e83
https://ora.ox.ac.uk/objects/uuid:0c7ff85f-6335-4cae-8848-852d1b63cd49
https://ora.ox.ac.uk/objects/uuid:0c7ff85f-6335-4cae-8848-852d1b63cd49
Recent years have seen a rapid increase in the number of CubeSats and other small satellites in orbit - these have highly constrained computational and communication resources, but still require robust secure communication to operate effectively. The
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dcb1a3a92ff7882e8f9e227c36dd87be
http://arxiv.org/abs/2305.12948
http://arxiv.org/abs/2305.12948
Satellite communications are increasingly crucial for telecommunications, navigation, and Earth observation. However, many widely used satellites do not cryptographically secure the downlink, opening the door for radio spoofing attacks. Recent develo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1064::b4a2a6897c887d606c00ccb1605c1ce5
https://ora.ox.ac.uk/objects/uuid:e9d5d85f-b77f-4f11-8006-17dd88660467
https://ora.ox.ac.uk/objects/uuid:e9d5d85f-b77f-4f11-8006-17dd88660467
Data from Earth Observation satellites has become crucial in private enterprises, research applications, and in coordinating national responses to events such as forest fires. These purposes are supported by data derived from a variety of satellites,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1064::0bc2d51aef650b1a0c0408c3aeee8f63
https://ora.ox.ac.uk/objects/uuid:a116b661-1b1f-4cda-ad0d-ac16e9dd12ac
https://ora.ox.ac.uk/objects/uuid:a116b661-1b1f-4cda-ad0d-ac16e9dd12ac
Publikováno v:
ACM Transactions on Internet of Things. 3:1-28
In this article, we verify physical events using data from an ensemble of smart home sensors. This approach both protects against event sensor faults and sophisticated attackers. To validate our system’s performance, we set up a “smart home” in
Electric vehicle charging sessions can be authorised in different ways, ranging from smartphone applications to smart cards with unique identifiers that link the electric vehicle to the charging station. However, these methods do not provide strong a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::de0a6b6cba70daabf4cf0d09e7be5596
https://ora.ox.ac.uk/objects/uuid:77f774dc-9ab2-4d9b-9b4c-f0988bbef2ff
https://ora.ox.ac.uk/objects/uuid:77f774dc-9ab2-4d9b-9b4c-f0988bbef2ff
Autor:
Birnbach, S
In recent years, smart home systems have become increasingly popular. With this increased popularity has come a newfound prevalence of IoT devices with varied sensor functionality in peoples' homes. These types of IoT devices are widely considered to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1064::a9cdbea1e1970835875d6aa843208b77
https://ora.ox.ac.uk/objects/uuid:23fbc161-9bbc-4e2d-9d5d-5f6abaff6987
https://ora.ox.ac.uk/objects/uuid:23fbc161-9bbc-4e2d-9d5d-5f6abaff6987
Publikováno v:
2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm).
The adoption of fully Electric Vehicles (EVs) is happening at a rapid pace. To make the charging as fast and convenient as possible, new charging approaches are developed constantly. One such approach is wireless charging, also known as Wireless Powe
Publikováno v:
2022 IEEE Security and Privacy Workshops (SPW).
Attributing interactions with Internet of Things (IoT) devices to specific users in smart environments is extremely important as it enables personalized configurations and access control. This requirement is particularly stringent when it comes to pa