The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a physical (PHY)-layer authentication system that exploits the channel state information of radio transmitters to detect spoofing attacks in wireless networks. By using multiple landmarks and multiple antennas in the channel estimation, this authentication system enhances the spatial resolution of the channel information and thus improves the spoofing detection accuracy....
Spoofing detection is essential in underwater sensor networks (UWSNs), especially for safety-critical applications. Because of the high bit error rates, low bandwidth and large delay of the acoustic channels, it is challenging to detect spoofing attacks in UWSNs. In this paper, we propose spoofing detection strategies based on reinforcement learning. The interactions between a surface station and...
Jamming games between a cognitive radio enabled secondary user (SU) and a cognitive radio enabled jammer are considered, in which end-user decision making is modeled using prospect theory (PT). More specifically, the interactions between a user and a smart jammer regarding their respective choices of transmit power are formulated as a game under the assumption that the end-user decision making under...
By recruiting sensor-equipped smartphone users to report sensing data, mobile crowdsensing (MCS) provides location-based services such as environmental monitoring. However, due to the distributed and potentially selfish nature of smartphone users, mobile crowdsensing applications are vulnerable to faked sensing attacks by users who bid a low price in an MCS auction and provide faked sensing reports...
Accurate malware detections on mobile devices such as smartphones require fast processing of a large number of data and thus cloud offloading can be used to improve the security performance of mobile devices with limited resources. The performance of malware detection with cloud offloading depends on the computation speed of the cloud, the population sharing the cloud resources and the bandwidth of...
In this paper, we investigate the PHY-layer authentication in wireless networks, which exploits PHY-layer channel information such as the received signal strength indicators to detect spoofing attacks. The interactions between a legitimate receiver node and a spoofer are formulated as a PHY- authentication game. More specifically, the receiver chooses the test threshold in the hypothesis test of the...
Jamming attacks that can further lead to denial of service attacks have thrown serious threats to underwater sensor networks (UWSNs). However, due to the narrow bandwidth of underwater acoustic signals and time variant propagation environments, jamming in UWSNs cannot be fully addressed by spread spectrum techniques, one type of widely-used antijamming methods in wireless networks for decades. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.