Zobrazeno 1 - 10
of 1 945
pro vyhledávání: '"wireless security"'
Autor:
Quan Zhou, Yingtao Niu
Publikováno v:
Advanced Intelligent Systems, Vol 6, Iss 8, Pp n/a-n/a (2024)
Herein, a comprehensive review of the evolution of intelligent communication anti‐jamming techniques is provided. First, a clear definition of the concept and elaboration on the inherent connotations and capability characteristics of intelligent co
Externí odkaz:
https://doaj.org/article/9feb860e17ef4d158b3e7bcdbf95b9e8
Publikováno v:
IEEE Access, Vol 12, Pp 115973-115980 (2024)
In this paper, we present a novel key-indexed channel phase permutation method designed to enhance the security of physical-layer (PHY) authentication in the presence of correlated sub-channels. In wireless communication, secret keys should be protec
Externí odkaz:
https://doaj.org/article/1f17f51744d64169b6c19011b7bbfb06
Publikováno v:
Sensors, Vol 24, Iss 13, p 4411 (2024)
LoRa enables long-range communication for Internet of Things (IoT) devices, especially those with limited resources and low power requirements. Consequently, LoRa has emerged as a popular choice for numerous IoT applications. However, the security of
Externí odkaz:
https://doaj.org/article/40b1404161974aacbd726f53c228873b
Publikováno v:
IEEE Access, Vol 11, Pp 112438-112450 (2023)
The size of wireless networks and the number of wireless devices are growing daily. A crucial part of wireless security involves preventing unauthorized access by using wireless security protocols in order to protect the data in wireless networks. In
Externí odkaz:
https://doaj.org/article/0a2b66aabc4f4376b439a740d0e7dc80
Autor:
Ahmaddul Hadi, Sandi Rahmadika, Bayu Ramadhani Fajri, Geovanne Farell, Khairi Budayawan, Wiki Lofandri
Publikováno v:
IEEE Access, Vol 11, Pp 111053-111067 (2023)
This work shows the comprehensive model of obfuscation techniques in decentralized peer-to-peer (P2P) network transactions by consolidating a distributed learning approach and blockchain as the backbone technologies. We provide several protocols by u
Externí odkaz:
https://doaj.org/article/c16dbbb429274c13b6d3f26eaa910c0d
Autor:
Hoorin Park, Wonjun Lee
Publikováno v:
IEEE Access, Vol 11, Pp 31912-31923 (2023)
Distinguishable physical layer features of radio frequency have the potential to serve as new fingerprints for authentication in backscatter networks. They have a definite advantage that backscatter tags do not have to run resource-intensive operatio
Externí odkaz:
https://doaj.org/article/e414a68730c34c3db7b3c7be5ad28557
Publikováno v:
Aerospace, Vol 11, Iss 3, p 235 (2024)
The automatic dependent surveillance broadcast (ADS-B) system is one of the key components of the next generation air transportation system (NextGen). ADS-B messages are transmitted in unencrypted plain text. This, however, causes significant securit
Externí odkaz:
https://doaj.org/article/9185923939254d138c75d328ac736e1b
Autor:
Junpei Xu, Anbang Wang, Xinhui Zhang, Laihong Mo, Yuhe Zhang, Yuehui Sun, Yuwen Qin, Yuncai Wang
Publikováno v:
Entropy, Vol 26, Iss 3, p 181 (2024)
We propose and experimentally demonstrate a wireless-channel key distribution scheme based on laser synchronization induced by a common wireless random signal. Two semiconductor lasers are synchronized under injection of the drive signal after electr
Externí odkaz:
https://doaj.org/article/c12bb807a532403e8debcc23ee5eaa8e
Autor:
Shen Guanxiong, Zhang Junqing
Publikováno v:
Security and Safety, Vol 3, p 2023019 (2024)
Radio frequency fingerprint identification (RFFI) shows great potential as a means for authenticating wireless devices. As RFFI can be addressed as a classification problem, deep learning techniques are widely utilized in modern RFFI systems for thei
Externí odkaz:
https://doaj.org/article/85affbb8ff6243f1aeb9a3b4ec1acd81
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.