WT Zhu, J Zhou, RH Deng, F Bao - Journal of Network and Computer …, 2012 - Elsevier
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource- constrained sensor nodes, but is often deployed in unattended and harsh environments to …
The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full …
L Xiao, C Xie, M Min, W Zhuang - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) systems are vulnerable to smart attackers, who are selfish and subjective end-users and use smart radio devices to change their attack types and …
A novel physical layer authentication scheme is proposed in this paper by exploiting the time- varying carrier frequency offset (CFO) associated with each pair of wireless communications …
D Wang, B Bai, K Lei, W Zhao, Y Yang, Z Han - IEEE Access, 2019 - ieeexplore.ieee.org
Heterogeneous Internet of Things (IoT) and multi-access mobile edge computing (MA-MEC) are believed as supporting technologies for building a smart city. The advancement and …
Wireless communication is one of the key technologies that actualize the Internet of Things (IoT) concept into the real world. Understanding the security performance of wireless …
J Liu, X Wang - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
A novel physical layer authentication enhancement scheme is proposed in this paper by integrating multipath delay characteristics of wireless channels into the channel impulse …
The wireless medium offers many opportunities for broadcast communications. However, it also opens the possibility for attackers to eavesdrop the broadcast data or to pretend to be …
SU Rehman, K Sowerby… - 2012 Australian …, 2012 - ieeexplore.ieee.org
RF fingerprinting is a technique, where a transmitter is identified from its electromagnetic emission. Most existing RF fingerprinting techniques require high sampling rates. This paper …