Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions
D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …
high-speed data transfer. The data collected fuel many automation applications such as …
Cyber threats to industrial IoT: a survey on attacks and countermeasures
In today's Industrial Internet of Things (IIoT) environment, where different systems interact
with the physical world, the state proposed by the Industry 4.0 standards can lead to …
with the physical world, the state proposed by the Industry 4.0 standards can lead to …
A comprehensive review of architecture, communication, and cybersecurity in networked microgrid systems
Networked microgrids (NMGs) are developing as a viable approach for integrating an
expanding number of distributed energy resources (DERs) while improving energy system …
expanding number of distributed energy resources (DERs) while improving energy system …
A comprehensive survey on the cyber-security of smart grids: Cyber-attacks, detection, countermeasure techniques, and future directions
One of the significant challenges that smart grid networks face is cyber-security. Several
studies have been conducted to highlight those security challenges. However, the majority …
studies have been conducted to highlight those security challenges. However, the majority …
Index Modulation Based Key Exchange Scheme for Internet of Things Networks
T Alshamaseen, S Althunibat, M Qaraqe… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The pervasiveness of the Internet of Things (IoT) in our daily lives has been remarkably
increasing over the past years. Due to their massive connectivity and limited resources …
increasing over the past years. Due to their massive connectivity and limited resources …
Mimicking DH Key Exchange Over a Full Duplex Wireless Channel via Bisparse Blind Deconvolution
Secret key generation between authenticated devices is a pivotal task for secure
communications. Diffie-Hellman (DH) is de-facto standard but not post-quantum secure. In …
communications. Diffie-Hellman (DH) is de-facto standard but not post-quantum secure. In …
Data confidentiality for IoT networks: cryptographic gaps and physical-layer opportunities
The conventional solution for providing data confidentiality is by means of encryption (a
branch of cryptography). However, encryption schemes are generally designed to provide a …
branch of cryptography). However, encryption schemes are generally designed to provide a …
Communication Channel Anonymity
Communication Channel Anonymity Page 1 C Communication Channel Anonymity Simone
Raponi and Gabriele Oligeri Division of Information and Computing Technology, College of …
Raponi and Gabriele Oligeri Division of Information and Computing Technology, College of …
AI-Driven Detection of Cybersecurity-Related Patterns
S Raponi - 2021 - search.proquest.com
The considerable increase in the number of attacks and online violations in recent years
highlighted how security is more often considered a feature than a necessity. Indeed, most of …
highlighted how security is more often considered a feature than a necessity. Indeed, most of …