Security of emergent automotive systems: A tutorial introduction and perspectives on practice

A Lopez, AV Malawade, MA Al Faruque… - IEEE Design & …, 2019 - ieeexplore.ieee.org
Security of Emergent Automotive Systems: A Tutorial Introduction and Perspectives on Practice
Page 1 10 2168-2356/19©2019 IEEE Copublished by the IEEE CEDA, IEEE CASS, IEEE SSCS …

Towards safe and secure autonomous and cooperative vehicle ecosystems

A Lima, F Rocha, M Völp… - Proceedings of the 2nd …, 2016 - dl.acm.org
Semi-autonomous driver assists are already widely deployed and fully autonomous cars are
progressively leaving the realm of laboratories. This evolution coexists with a progressive …

Systems and methods for securing wireless communications

MM Krunz, B Akgun, P Siyari, H Rahbari… - US Patent …, 2018 - Google Patents
Abstract Systems and methods of friendly jamming for securing wireless communications at
the physical layer are presented. Under the assumption of exact knowledge of the …

Energy-efficient routing in wireless networks in the presence of jamming

A Sheikholeslami, M Ghaderi… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
The effectiveness and the simple implementation of physical layer jammers make them an
essential threat for wireless networks. In a multihop wireless network, where jammers can …

Performance evaluation of cooperative mobile communication security using reinforcement learning

GG Lema, KS Weldemichael, LE Weldemariam - Heliyon, 2021 - cell.com
In wireless networks, there are many channel impairments including shadowing, path loss,
and fading. Due to the shadowing, path loss, and fading, the direct transmission between the …

A scalable feedback mechanism for distributed nullforming with phase-only adaptation

A Kumar, R Mudumbai, S Dasgupta… - … on Signal and …, 2015 - ieeexplore.ieee.org
This paper considers a problem of distributed nullforming, in which multiple wireless
transmitters steer a null toward a designated receiver by only adjusting their carrier phases …

Jamming-aware minimum energy routing in wireless networks

A Sheikholeslami, M Ghaderi… - 2014 IEEE …, 2014 - ieeexplore.ieee.org
The effectiveness and straightforward implementation of physical layer jammers make them
an essential security threat for wireless networks. In this paper, reliable communication in a …

Hammer and anvil: The threat of a cross-layer jamming-aided data control attack in multihop wireless networks

L Zhang, T Melodia - 2015 IEEE Conference on …, 2015 - ieeexplore.ieee.org
This paper considers potential risks to data security in multi-hop infrastructureless wireless
networks where cross-layer routing protocols are used. We show that an adversary, as long …

Energy-efficient secrecy in wireless networks based on random jamming

A Sheikholeslami, M Ghaderi… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
This paper considers secure energy-efficient routing in the presence of multiple passive
eavesdroppers. Previous work in this area has considered secure routing assuming …

Supporting phy-layer security in multi-link wireless networks using friendly jamming

R Eletreby, H Rahbari, M Krunz - 2015 IEEE Global …, 2015 - ieeexplore.ieee.org
Friendly jamming is a PHY-layer technique used to secure wireless communications. Unlike
previous efforts that fix the placement of the friendly jamming devices, in this paper we …