Biblio
Filters: Author is Taha, Ahmad [Clear All Filters]
Cross-Layer Authentication based on Physical-Layer Signatures for Secure Vehicular Communication. 2022 IEEE Intelligent Vehicles Symposium (IV). :1315—1320.
.
2022. In recent years, research has focused on exploiting the inherent physical (PHY) characteristics of wireless channels to discriminate between different spatially separated network terminals, mitigating the significant costs of signature-based techniques. In this paper, the legitimacy of the corresponding terminal is firstly verified at the protocol stack’s upper layers, and then the re-authentication process is performed at the PHY-layer. In the latter, a unique PHY-layer signature is created for each transmission based on the spatially and temporally correlated channel attributes within the coherence time interval. As part of the verification process, the PHY-layer signature can be used as a message authentication code to prove the packet’s authenticity. Extensive simulation has shown the capability of the proposed scheme to support high detection probability at small signal-to-noise ratios. In addition, security evaluation is conducted against passive and active attacks. Computation and communication comparisons are performed to demonstrate that the proposed scheme provides superior performance compared to conventional cryptographic approaches.
Identification of Cyber Attacks on Water Distribution Systems by Unveiling Low-Dimensionality in the Sensory Data. World Environmental and Water Resources Congress 2017. :660–675.
.
2017.
Assessing power system state estimation accuracy with GPS-spoofed PMU Measurements. Innovative Smart Grid Technologies Conference (ISGT), 2016 IEEE Power & Energy Society. :1–5.
.
2016.
Planning energy-efficient bipedal locomotion on patterned terrain. SPIE Defense+ Security. :98370A–98370A.
.
2016.