In this article, we propose a lightweight security scheme for ensuring both information confidentiality and transmission resiliency in the Internet-of-Things (IoT) communication. A …
J Bravo-Arrabal, P Zambrana… - IEEE …, 2022 - ieeexplore.ieee.org
Search and Rescue operations in emergency response to natural or human catastrophes have the main objective of locating and rescuing potential victims as fast as possible, thus …
Autonomous ground vehicle convoys heavily rely on wireless communications to perform leader-follower operations, which make them particularly vulnerable to denial-of-service …
Wireless communication devices must be protected from malicious threats, including active jamming attacks, due to the widespread use of wireless systems throughout our every‐day …
K Payne, K Xu, JH Choi, JK Lee - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Power handling capability of a tunable plasma-based multilayer absorber is studied using multiphysics analysis, then validated by experimental data. The proposed two-pole absorber …
Detection of jamming attacks is an important tool to improve the resource efficiency of jammer resilient communication networks. Detecting reactive jammers is especially difficult …
Traditional studies on jamming effectiveness and propagation over the wireless channel assume ideal theoretical models, such as Friis and Rician. However, the cited models have …
Cybersecurity challenges pose a significant threat to Healthcare Cyber Physical Systems (CPS) because they heavily rely on wireless communication. Particularly, jamming attacks …
Modern battlefields are experiencing an increased dependency on smart devices that can sense, process, and communicate data, also known as the Military Internet of Things (MIoT) …