Pilot spoofing detection for massive MIMO mmWave communication systems with a cooperative relay

S Wang, X Fu, R Ruby, Z Li - Computer Communications, 2023 - Elsevier
In massive millimeter-wave (mmWave) multiple-input–multiple-output (MIMO) systems,
eavesdroppers may transmit the identical pilot sequences as legitimate users to manipulate …

[HTML][HTML] Sdn-based survivability analysis for v2i communications

L Jin, G Zhang, H Zhu, W Duan - Sensors, 2020 - mdpi.com
In vehicle-to-infrastructure (V2I) communications, various failures in the dynamic movement
pose serious link interruptions. To study the continuous service quality for the V2I network …

[PDF][PDF] Multi-stage secure clusterhead selection using discrete rule-set against unknown attacks in wireless sensor network

N Tejashwini, DRS Kumar, KS Reddy - International Journal of Electrical …, 2020 - core.ac.uk
Security is the rising concern of the wireless network as there are various forms of
reonfigurable network that is arised from it. Wireless sensor network (WSN) is one such …

Crypto-aided MAP test for low-latency detection of false data in short packets

SW Kim, X Liu - IEEE Transactions on Information Forensics …, 2021 - ieeexplore.ieee.org
Cryptography has been used as the first line of defense to ensure data integrity. However, it
incurs a significant overhead for short packets which represent the most common form of …

Malicious relay detection using sentinels: A stochastic geometry framework

U Tefek, A Tandon, TJ Lim - Journal of Communications and …, 2020 - ieeexplore.ieee.org
Next generation wireless networks are under high risk of security attacks due to increased
connectivity and information sharing among peer nodes. Some of the nodes could …

Reliable cooperative charging protocol against fault data for supercapacitors charging systems

Y Miao, J He, S Zhu - 2019 IEEE 15th International Conference …, 2019 - ieeexplore.ieee.org
A cooperative charging protocol for the super-capacitors on catenary-free trams is a
promising method to solve the high-power-charging load. The protocol can efficiently …

Attack detection for massive MIMO relay system

R Cao, Y Wan, H Yu, Y Lu, H Gao - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
This article focuses on a two-hop relay system, where a potential malicious single-antenna
relay may forward altered symbols to a base station (BS) equipped with massive antennas …

Guaranteeing Information Transfer Integrity Through Two Non-Colluding Malicious Nodes Against iid Attacks

X Zheng, R Cao, H Gao, Y Lu - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
This paper considers channel coding problems with the requirement of guaranteeing
information integrity in the presence of malicious relays (MRs). The proved random channel …