[HTML][HTML] Open RAN security: Challenges and opportunities

M Liyanage, A Braeken, S Shahabuddin… - Journal of Network and …, 2023 - Elsevier
Abstract Open RAN (ORAN, O-RAN) represents a novel industry-level standard for RAN
(Radio Access Network), which defines interfaces that support inter-operation between …

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

Towards scalable and channel-robust radio frequency fingerprint identification for LoRa

G Shen, J Zhang, A Marshall… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Radio frequency fingerprint identification (RFFI) is a promising device authentication
technique based on transmitter hardware impairments. The device-specific hardware …

DÏoT: A federated self-learning anomaly detection system for IoT

TD Nguyen, S Marchal, M Miettinen… - 2019 IEEE 39th …, 2019 - ieeexplore.ieee.org
IoT devices are increasingly deployed in daily life. Many of these devices are, however,
vulnerable due to insecure design, implementation, and configuration. As a result, many …

A comprehensive survey on radio frequency (RF) fingerprinting: Traditional approaches, deep learning, and open challenges

A Jagannath, J Jagannath, PSPV Kumar - Computer Networks, 2022 - Elsevier
Fifth generation (5G) network and beyond envision massive Internet of Things (IoT) rollout to
support disruptive applications such as extended reality (XR), augmented/virtual reality …

Iot sentinel: Automated device-type identification for security enforcement in iot

M Miettinen, S Marchal, I Hafeez… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT
devices have become prominent. Several vendors are producing IP-connected devices for …

A review of radio frequency fingerprinting techniques

N Soltanieh, Y Norouzi, Y Yang… - IEEE Journal of Radio …, 2020 - ieeexplore.ieee.org
Radio frequency (RF) fingerprinting techniques have been used as an extra security layer
for wireless devices. Unique fingerprints are used to identify wireless devices in order to …

Machine learning for the detection and identification of Internet of Things devices: A survey

Y Liu, J Wang, J Li, S Niu… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming an indispensable part of everyday life, enabling a
variety of emerging services and applications. However, the presence of rogue IoT devices …

Deep learning convolutional neural networks for radio identification

S Riyaz, K Sankhe, S Ioannidis… - IEEE Communications …, 2018 - ieeexplore.ieee.org
Advances in software defined radio (SDR) technology allow unprecedented control on the
entire processing chain, allowing modification of each functional block as well as sampling …

A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …