Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless devices
biblio
Cognitive Radio Networks: Recent Advances in Spectrum Sensing Techniques and Security
Submitted by aekwall on Mon, 03/15/2021 - 12:04pm
wireless nodes
Cognitive Radio Security
wireless spectrum
spectrum sensing techniques
spectrum resources
spectrum access
Dynamic Spectrum Allocation
Channel allocation
spectrum sensing
cognitive radio networks
cognitive radio
wireless network
Reinforcement learning
radio spectrum management
telecommunication security
Energy Efficiency
wireless networks
wireless channels
signal detection
sensors
radio networks
wireless devices
Communication system security
resource management
wireless sensor networks
pubcrawl
Resiliency
biblio
Flexible Design of Finite Blocklength Wiretap Codes by Autoencoders
Submitted by grigby1 on Fri, 09/18/2020 - 1:46pm
leakage tradeoff
wiretap code
wireless devices
vanishing leakage
traditional codes
telecommunication security
security
Resiliency
resilience
radiocommunication
pubcrawl
physical layer security
Neural networks
neural network autoencoders
Metrics
legitimate receiver
autoencoder
information theory
Gaussian wiretap channels
Gaussian channels
flexible wiretap code design
flexible design
finite blocklength wiretap codes
finite blocklength
error statistics
error rate
decoding error probability
Decoding
Cryptography
Compositionality
coding theory
channel coding
biblio
IoT Security in Wireless Devices
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
Internet of Things
wireless sensor networks
wireless devices
Wireless communication
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
IoT security
IoT
Internet of Things framework
Communication system security
internet
interconnected devices
Human Factors
Human behavior
encryption
Elliptic curve cryptography
ECC (elliptic curve cryptography)
ECC
Conferences
computer network security
composability
biblio
Improving Wireless Network Security Based On Radio Fingerprinting
Submitted by aekwall on Mon, 02/17/2020 - 2:34pm
security threats
Wireless Network Security
wireless device transmitters
transient signals
radio transmitters
Radio Frequency Fingerprints
radio frequency fingerprint extraction
radio fingerprinting
physical characteristics
fractional fourier transform
Fourier transforms
identity authentication
wireless networks
sensor security
authorisation
Signal to noise ratio
Transient analysis
Metrics
wireless devices
Communication system security
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
feature extraction
security
telecommunication security
biblio
Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Secret free
industrial automation sensors
key establishment
key establishment processes
man in the middle attack
medical devices
Message Integrity Protection
multiple devices
multiple legitimate devices
ON OFF Keying
out-of-band channels
pairing process
physical layer security
physical-layer group message integrity
in-band message integrity verification
secure deployment
secure device bootstrapping
secure pairing
shared secrets
signal manipulation attacks
VERSE
wireless channel
wireless devices
wireless signal annihilation
wireless signal injection
Wireless Signal Manipulation Attack
wireless signal manipulations
Security by Default
Cryptographic Protocols
Internet of Things
security of data
resilience
wireless sensor networks
pubcrawl
Resiliency
Scalability
Protocols
Wireless communication
telecommunication security
message authentication
performance evaluation
Communication system security
authentication
authorisation
wireless channels
body area networks
public key cryptography
data integrity
autonomous vehicles
man-in-the-middle attacks
advanced wireless attacks
authenticated channels
bootstrapping protocol
extensive human involvement
Group Bootstrapping
hub
biblio
Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
lightweight sybilfree-APIT algorithm
Metrics
wireless localization schemes
wireless devices
Wireless communication
SF-APIT scheme
SF-APIT
sensor placement
sensor nodes
secure APIT localization scheme
RSSI
received signal strength
range-free method
location-aware applications
localization
telecommunication security
hostile WSN
distributed WSNs
distributed WSN
distributed wireless sensor networks
detection rate
Cryptography
Communication system security
antennas
Peer-to-peer computing
sybil attacks
Global Positioning System
wireless sensor networks
composability
pubcrawl
biblio
A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
physical layer security
cross-layer
cyber-physical systems
Human behavior
key establishment
key management
Metrics
pubcrawl
resilience
Resiliency
Scalability
security
wireless devices
biblio
Toward Wireless Security without Computational Assumptions #x2014;Oblivious Transfer Based on Wireless Channel Characteristics
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
polynomial-time computable function
wireless security
wireless devices
Wireless communication
wireless channels
wireless channel characteristics
transport protocols
security
Protocols
Probes
private communications
privacy preserving password verification
1-out-of-2 oblivious transfer protocol
physical channel characteristics
Oblivious transfer
data privacy
Cryptography
cryptographic tools
Cryptographic Protocols
cryptographic protocol
computational complexity
computational assumptions
Communication system security
Channel estimation