[go: up one dir, main page]

Jacovic et al., 2022 - Google Patents

Experimentation framework for wireless communication systems under jamming scenarios

Jacovic et al., 2022

View PDF @Full View
Document ID
1472986505684299775
Author
Jacovic M
Liston M
Pano V
Mainland G
Dandekar K
Publication year
Publication venue
IET Cyber‐Physical Systems: Theory & Applications

External Links

Snippet

Cyber‐physical systems (CPS) integrate control, sensing, and processing into interconnected physical components to support applications within transportation, energy, healthcare, environment, and various other areas. Secure and reliable wireless …
Continue reading at ietresearch.onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/24Cell structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/06Testing, supervising or monitoring using simulated traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W72/00Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection

Similar Documents

Publication Publication Date Title
Osorio et al. Towards 6G-enabled internet of vehicles: Security and privacy
Jiang et al. Three-dimensional non-stationary wideband geometry-based UAV channel model for A2G communication environments
Viriyasitavat et al. Vehicular communications: Survey and challenges of channel and propagation models
Jia et al. Modelling unmanned aerial vehicles base station in ground‐to‐air cooperative networks
Ma et al. Secure mmWave communication using UAV-enabled relay and cooperative jammer
Wu et al. Measurement-based channel characterization for 5G downlink based on passive sounding in sub-6 GHz 5G commercial networks
Dandekar et al. Grid software defined radio network testbed for hybrid measurement and emulation
Jacovic et al. Mitigating RF jamming attacks at the physical layer with machine learning
Kosmanos et al. Estimating the relative speed of RF jammers in VANETs
Haq et al. Need of UAVs and physical layer security in next-generation non-terrestrial wireless networks: potential challenges and open issues
Yuan et al. Secrecy rate analysis against aerial eavesdropper
Saedi et al. Generation of realistic signal strength measurements for a 5G Rogue Base Station attack scenario
Michailidis et al. Software-Defined Radio Deployments in UAV-Driven Applications: A Comprehensive Review
Oliveira et al. Performance assessment of long‐range and Sigfox protocols with mobility support
Sinha et al. Fundamental limits on detection of UAVs by existing terrestrial RF networks
Chandra Shit et al. Privacy‐preserving cooperative localization in vehicular edge computing infrastructure
Jacovic et al. Experimentation framework for wireless communication systems under jamming scenarios
Grieco et al. A system-level simulation module for multi-UAV IRS-assisted communications
Khan et al. A Dual‐Mode Medium Access Control Mechanism for UAV‐Enabled Intelligent Transportation System
Zhang et al. 3-D MIMO parametric stochastic channel model for urban macrocell scenario
Zhou et al. Physical layer authentication for UAV communications under Rayleigh and Rician channels
Baldini et al. An analysis of the privacy threat in vehicular ad hoc networks due to radio frequency fingerprinting
Zeng et al. Measurement and Simulation for Vehicle‐to‐Infrastructure Communications at 3.5 GHz for 5G
Jeong et al. Empirical Path‐Loss Modeling and a RF Detection Scheme for Various Drones
Chowdhury et al. A taxonomy and survey on experimentation scenarios for aerial advanced wireless testbed platforms