[HTML][HTML] Open RAN security: Challenges and opportunities
Abstract Open RAN (ORAN, O-RAN) represents a novel industry-level standard for RAN
(Radio Access Network), which defines interfaces that support inter-operation between …
(Radio Access Network), which defines interfaces that support inter-operation between …
A survey of physical-layer authentication in wireless communications
N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
Towards scalable and channel-robust radio frequency fingerprint identification for LoRa
Radio frequency fingerprint identification (RFFI) is a promising device authentication
technique based on transmitter hardware impairments. The device-specific hardware …
technique based on transmitter hardware impairments. The device-specific hardware …
DÏoT: A federated self-learning anomaly detection system for IoT
IoT devices are increasingly deployed in daily life. Many of these devices are, however,
vulnerable due to insecure design, implementation, and configuration. As a result, many …
vulnerable due to insecure design, implementation, and configuration. As a result, many …
A comprehensive survey on radio frequency (RF) fingerprinting: Traditional approaches, deep learning, and open challenges
Fifth generation (5G) network and beyond envision massive Internet of Things (IoT) rollout to
support disruptive applications such as extended reality (XR), augmented/virtual reality …
support disruptive applications such as extended reality (XR), augmented/virtual reality …
Iot sentinel: Automated device-type identification for security enforcement in iot
M Miettinen, S Marchal, I Hafeez… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT
devices have become prominent. Several vendors are producing IP-connected devices for …
devices have become prominent. Several vendors are producing IP-connected devices for …
A review of radio frequency fingerprinting techniques
N Soltanieh, Y Norouzi, Y Yang… - IEEE Journal of Radio …, 2020 - ieeexplore.ieee.org
Radio frequency (RF) fingerprinting techniques have been used as an extra security layer
for wireless devices. Unique fingerprints are used to identify wireless devices in order to …
for wireless devices. Unique fingerprints are used to identify wireless devices in order to …
Machine learning for the detection and identification of Internet of Things devices: A survey
The Internet of Things (IoT) is becoming an indispensable part of everyday life, enabling a
variety of emerging services and applications. However, the presence of rogue IoT devices …
variety of emerging services and applications. However, the presence of rogue IoT devices …
Deep learning convolutional neural networks for radio identification
S Riyaz, K Sankhe, S Ioannidis… - IEEE Communications …, 2018 - ieeexplore.ieee.org
Advances in software defined radio (SDR) technology allow unprecedented control on the
entire processing chain, allowing modification of each functional block as well as sampling …
entire processing chain, allowing modification of each functional block as well as sampling …
A survey on wireless security: Technical challenges, recent advances, and future trends
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …
accessible to both authorized and illegitimate users. This completely differs from a wired …