Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions
W Fei, H Ohno, S Sampalli - ACM Computing Surveys, 2023 - dl.acm.org
The Internet of Things (IoT) encompasses a network of physical objects embedded with
sensors, software, and data processing technologies that can establish connections and …
sensors, software, and data processing technologies that can establish connections and …
InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections
R Cayre, F Galtier, G Auriol, V Nicomette… - 2021 51st Annual …, 2021 - ieeexplore.ieee.org
Bluetooth Low Energy (BLE) is nowadays one of the most popular wireless communication
protocols for Internet of Things (IoT) devices. As a result, several attacks have targeted this …
protocols for Internet of Things (IoT) devices. As a result, several attacks have targeted this …
Distributed IoT Community Detection via Gromov–Wasserstein Metric
The Internet of Things (IoT) network is a complex system interconnected by different types of
devices, eg, sensors, smartphones, computers, etc. Community detection is a critical …
devices, eg, sensors, smartphones, computers, etc. Community detection is a critical …
Intrusion Detection System for IoT: Analysis of PSD Robustness
The security of internet of things (IoT) devices remains a major concern. These devices are
very vulnerable because of some of their particularities (limited in both their memory and …
very vulnerable because of some of their particularities (limited in both their memory and …
[PDF][PDF] 基于信道指纹的毫米波MIMO 系统身份欺骗攻击检测方案
杨立君, 李明航, 陆海涛, 郭林 - 电子与信息学报, 2023 - jeit.ac.cn
针对毫米波多输入输出系统(MIMO) 中的身份欺骗攻击问题, 该文提出一种基于信道指纹的攻击
检测方案. 在波束域中, 毫米波信道图样呈现波束的稀疏性和高方向特性, 且这种波束域特性与 …
检测方案. 在波束域中, 毫米波信道图样呈现波束的稀疏性和高方向特性, 且这种波束域特性与 …
Blekeeper: Response time behavior based man-in-the-middle attack detection
MA Yurdagul, HT Sencar - 2021 IEEE Security and Privacy …, 2021 - ieeexplore.ieee.org
Bluetooth Low Energy (BLE) has become one of the most popular wireless communication
protocols and is used in billions of smart devices. Despite several security features, the …
protocols and is used in billions of smart devices. Despite several security features, the …
Strengthening Industrial IoT Security: Device Fingerprinting and ML-Based Node Authentication at Gateway
L Samal, KK Mahapatra… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
This paper aims to enhance the security of data transmission in small-scale industrial IoT
systems using a novel approach combining static and dynamic device fingerprinting, sensor …
systems using a novel approach combining static and dynamic device fingerprinting, sensor …
Détection d'intrusions réaliste dans les maisons connectées à l'aide d'indicateurs physiques volatiles
O Lourme - 2023 - theses.hal.science
Au sein de l'Internet des Objets, le secteur de la maison connectée est en plein essor. Pour
quelques dizaines d'euros, chacun peut s' équiper de solutions domotiques intelligentes …
quelques dizaines d'euros, chacun peut s' équiper de solutions domotiques intelligentes …
Spoofing Attack Detection Scheme Based on Channel Fingerprint for Millimeter Wave MIMO System
L YANG, M LI, H LU, L GUO - 电子与信息学报, 2023 - jeit.ac.cn
Abstract Millimeter wave Multiple Input and Multiple Output (MIMO) channel exhibits beam
sparsity and high directivity in the beam domain, and the beam domain channel pattern is …
sparsity and high directivity in the beam domain, and the beam domain channel pattern is …