Security and privacy of smart waste management systems: a cyber-physical system perspective
A Brighente, M Conti, G Di Renzone… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Smart waste management systems (SWMSs) represent a fundamental technology to
efficiently manage the waste management and disposal process. Indeed, they provide …
efficiently manage the waste management and disposal process. Indeed, they provide …
Evaluation of channel hopping strategies against smart jamming attacks
Channel hopping is a well-known methodology to dynamically allocate frequency resources
to nodes in wireless communication systems. The aim of channel hopping is to mitigate …
to nodes in wireless communication systems. The aim of channel hopping is to mitigate …
SPADE: Secure Periodic Advertising using Coded Time-Channel Rendezvous for BLE Audio
Periodic advertising is an extended advertisement mechanism introduced in Bluetooth 5.0
that broadcasts time-synchronized data to multiple scanners. It is an essential operation in …
that broadcasts time-synchronized data to multiple scanners. It is an essential operation in …
LIBERO: LIght Bias as effective countermeasure against EavesdROpper attacks
Visible Light Communication (VLC) is expected to enable a wide range of applications in the
next generation wireless networks. These applications are recognized as sensitive and …
next generation wireless networks. These applications are recognized as sensitive and …
Cyber Security in 6G Networks
V Loscri - The Road towards 6G: Opportunities, Challenges, and …, 2023 - Springer
The main scope of this chapter is to introduce an overview on the security of the main
differences (or not) between 5G and 6G networks. Some key technologies, that are imposing …
differences (or not) between 5G and 6G networks. Some key technologies, that are imposing …
[PDF][PDF] Détection, identification et mise en quarantaine des menaces dans les infrastructures critiques sans fil basées sur l'IoT
Résumé Ces dernières années, les Infrastructures Critiques (CI) sont devenues la cible de
divers cybercriminels aux objectifs néfastes. Grâce aux développements de nouveaux …
divers cybercriminels aux objectifs néfastes. Grâce aux développements de nouveaux …
Threat detection, identification and quarantine in wireless IoT based Critical Infrastructures
E Staddon - 2022 - theses.hal.science
In recent years, Critical Infrastructures (CIs) have become under siege from various cyber
criminals with nefarious objectives. With the advancements of new technological paradigms …
criminals with nefarious objectives. With the advancements of new technological paradigms …