Jacovic et al., 2022 - Google Patents
Experimentation framework for wireless communication systems under jamming scenariosJacovic et al., 2022
View PDF- Document ID
- 1472986505684299775
- Author
- Jacovic M
- Liston M
- Pano V
- Mainland G
- Dandekar K
- Publication year
- Publication venue
- IET Cyber‐Physical Systems: Theory & Applications
External Links
Snippet
Cyber‐physical systems (CPS) integrate control, sensing, and processing into interconnected physical components to support applications within transportation, energy, healthcare, environment, and various other areas. Secure and reliable wireless …
- 238000004891 communication 0 title abstract description 11
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/24—Cell structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/06—Testing, supervising or monitoring using simulated traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W72/00—Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
- H04W72/04—Wireless resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W74/00—Wireless channel access, e.g. scheduled or random access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Osorio et al. | Towards 6G-enabled internet of vehicles: Security and privacy | |
| Jiang et al. | Three-dimensional non-stationary wideband geometry-based UAV channel model for A2G communication environments | |
| Viriyasitavat et al. | Vehicular communications: Survey and challenges of channel and propagation models | |
| Jia et al. | Modelling unmanned aerial vehicles base station in ground‐to‐air cooperative networks | |
| Ma et al. | Secure mmWave communication using UAV-enabled relay and cooperative jammer | |
| Wu et al. | Measurement-based channel characterization for 5G downlink based on passive sounding in sub-6 GHz 5G commercial networks | |
| Dandekar et al. | Grid software defined radio network testbed for hybrid measurement and emulation | |
| Jacovic et al. | Mitigating RF jamming attacks at the physical layer with machine learning | |
| Kosmanos et al. | Estimating the relative speed of RF jammers in VANETs | |
| Haq et al. | Need of UAVs and physical layer security in next-generation non-terrestrial wireless networks: potential challenges and open issues | |
| Yuan et al. | Secrecy rate analysis against aerial eavesdropper | |
| Saedi et al. | Generation of realistic signal strength measurements for a 5G Rogue Base Station attack scenario | |
| Michailidis et al. | Software-Defined Radio Deployments in UAV-Driven Applications: A Comprehensive Review | |
| Oliveira et al. | Performance assessment of long‐range and Sigfox protocols with mobility support | |
| Sinha et al. | Fundamental limits on detection of UAVs by existing terrestrial RF networks | |
| Chandra Shit et al. | Privacy‐preserving cooperative localization in vehicular edge computing infrastructure | |
| Jacovic et al. | Experimentation framework for wireless communication systems under jamming scenarios | |
| Grieco et al. | A system-level simulation module for multi-UAV IRS-assisted communications | |
| Khan et al. | A Dual‐Mode Medium Access Control Mechanism for UAV‐Enabled Intelligent Transportation System | |
| Zhang et al. | 3-D MIMO parametric stochastic channel model for urban macrocell scenario | |
| Zhou et al. | Physical layer authentication for UAV communications under Rayleigh and Rician channels | |
| Baldini et al. | An analysis of the privacy threat in vehicular ad hoc networks due to radio frequency fingerprinting | |
| Zeng et al. | Measurement and Simulation for Vehicle‐to‐Infrastructure Communications at 3.5 GHz for 5G | |
| Jeong et al. | Empirical Path‐Loss Modeling and a RF Detection Scheme for Various Drones | |
| Chowdhury et al. | A taxonomy and survey on experimentation scenarios for aerial advanced wireless testbed platforms |