IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices

F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …

Comparison of statistical and machine learning techniques for physical layer authentication

L Senigagliesi, M Baldi, E Gambi - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this article we consider authentication at the physical layer, in which the authenticator
aims at distinguishing a legitimate supplicant from an attacker on the basis of the …

Statistical and machine learning-based decision techniques for physical layer authentication

L Senigagliesi, M Baldi, E Gambi - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
In this paper we assess the security performance of key-less physical layer authentication
schemes in the case of time-varying fading channels, considering both partial and no …

Physical layer authentication techniques based on machine learning with data compression

L Senigagliesi, M Baldi, E Gambi - 2020 IEEE Conference on …, 2020 - ieeexplore.ieee.org
Wireless communications employing multi-carrier transmissions, like orthogonal frequency
division multiplexing (OFDM) or single-carrier frequency division multiple access (SCFDMA) …

Comparison between asymmetric and symmetric channel-based authentication for MIMO systems

S Tomasin - WSA 2017; 21th International ITG Workshop on …, 2017 - ieeexplore.ieee.org
Authentication is a key element of security, by which a receiver confirms the sender identity
of a message. Typical approaches include either key-based authentication at the application …

Empowering IoT Security: Enhancing Applications through Edge Computing and Blockchain

M Alam, AN Lone, S Mustajab - Blockchain for IoT Systems - taylorfrancis.com
The Internet of Things (IoT) has revolutionized various industries by enabling the
interconnection of physical devices and the collection and exchange of vast amounts of …

Solutions for large scale, efficient, and secure Internet of Things

D Zucchetto - 2019 - research.unipd.it
The design of a general architecture for the Internet of Things (IoT) is a complex task, due to
the heterogeneity of devices, communication technologies, and applications that are part of …