Solutions for mitigating cybersecurity risks caused by legacy software in medical devices: a scoping review

T Tervoort, MT De Oliveira, W Pieters… - IEEE …, 2020 - ieeexplore.ieee.org
Cyberattacks against healthcare institutions threaten patient care. The risk of being targeted
by a damaging attack is increased when medical devices are used which rely on …

Guessing on dominant paths: Understanding the limitation of wireless authentication using channel state information

Z Qu, R Duan, X Han, S Zhao, Y Liu… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
The channel state information (CSI) has been extensively studied in the literature to facilitate
authentication in wireless networks. The less focused is a systematic attack model to …

PHY-layer security is no alternative to cryptography

P Robyns, P Quax, W Lamotte - … of the 10th ACM Conference on …, 2017 - dl.acm.org
In recent works, numerous physical-layer security systems have been proposed as
alternatives to classic cryptography. Such systems aim to use the intrinsic properties of radio …

ROBin: Known-plaintext attack resistant orthogonal blinding via channel randomization

Y Pan, Y Zheng, M Li - IEEE INFOCOM 2020-IEEE Conference …, 2020 - ieeexplore.ieee.org
Orthogonal blinding based schemes for wireless physical layer security aim to achieve
secure communication by injecting noise into channels orthogonal to the main channel and …

[PDF][PDF] A Survey of Different Security Methods in the Physical Layer of TCP/IP Model

NR Saadallah, AK Alhafid, HA Al-Tayyar… - Eurasian Research …, 2021 - researchgate.net
In the previous two decades, cybersecurity risks and challenges in communications
networks, especially in wireless networks, have increased tremendously. Wireless networks …

Enhance wireless network performance and security with reconfigurable antennas

Y Pan - 2021 - search.proquest.com
Providing higher throughput, lower latency, and ubiquitous connectivity network services
have attracted significant attention in recent years. However, this technology has some …

Enhance Physical Layer Security via Channel Randomization with Reconfigurable Antennas

Y Pan, M Li, Y Hou, RM Gerdes, BA Cetiner - Proactive and Dynamic …, 2019 - Springer
Secure wireless communication techniques based on physical (PHY) layer properties are
promising alternatives or complements to traditional upper-layer cryptography-based …

[PDF][PDF] Physical Layer & Telecommunications Security Knowledge Area Version..

S Čapkun - cybok.org
This Knowledge Area is a review of the most relevant topics in wireless physical layer
security. The physical phenomenon utilized by the techniques presented in this Knowledge …

Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems

M Schulz, A Loch, M Hollick - Proceedings of the 9th ACM Conference …, 2016 - dl.acm.org
After being widely studied in theory, physical layer security schemes are getting closer to
enter the consumer market. Still, a thorough practical analysis of their resilience against …

[PDF][PDF] Physical Layer & Telecommunications Security Knowledge Area Issue.

S Čapkun - cybok.org
This Knowledge Area is a review of the most relevant topics in wireless physical layer
security. The physical phenomenon utilized by the techniques presented in this Knowledge …