A survey on security threats and detection techniques in cognitive radio networks

AG Fragkiadakis, EZ Tragos… - … Surveys & Tutorials, 2012 - ieeexplore.ieee.org
With the rapid proliferation of new technologies and services in the wireless domain,
spectrum scarcity has become a major concern. The allocation of the Industrial, Medical and …

Denial of service defence for resource availability in wireless sensor networks

OA Osanaiye, AS Alfa, GP Hancke - IEEE Access, 2018 - ieeexplore.ieee.org
Wireless sensor networks (WSN) over the years have become one of the most promising
networking solutions with exciting new applications for the near future. Its deployment has …

[LIVRE][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

On event-triggered control of linear systems under periodic denial-of-service jamming attacks

HS Foroush, S Martinez - 2012 IEEE 51st IEEE conference on …, 2012 - ieeexplore.ieee.org
In this paper we study the resilience of a continuous LTI system which is controlled remotely
via a wireless channel. An energy-constrained periodic (partially known) jammer is …

Attack-tolerant switched fault detection filter for networked stochastic systems under resilient event-triggered scheme

X Chen, S Hu, D Yue, X **e… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This article investigates the problem of event-triggered switched fault-detection filters for
networked stochastic systems under Denial-of-Service (DoS) jamming attacks. The …

Digital filter design for jamming mitigation in 802.15. 4 communication

B DeBruhl, P Tague - 2011 Proceedings of 20th International …, 2011 - ieeexplore.ieee.org
Jamming attackers can dramatically increase attack efficiency and stealth by randomly or
periodically cycling the jamming transmission on and off, attacks respectively known as …

A lightweight framework for secure life-logging in smart environments

NE Petroulakis, EZ Tragos, AG Fragkiadakis… - … security technical report, 2013 - Elsevier
As the world becomes an interconnected network where objects and humans interact with
each other, new challenges and threats appear in the ecosystem. In this interconnected …

Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype

AG Fragkiadakis, EZ Tragos, T Tryfonas… - EURASIP Journal on …, 2012 - Springer
The proliferation of wireless networks has been remarkable during the last decade. The
license-free nature of the ISM band along with the rapid proliferation of the Wi-Fi-enabled …

On multi-input controllable linear systems under unknown periodic dos jamming attacks

HS Foroush, S Martinez - 2013 Proceedings of the Conference on Control and …, 2013 - SIAM
In this paper, we study remotely controlled and observed multi-input controllable continuous
linear systems, subject to periodic Denial-of-Service (DoS) jamming attacks. We first design …

Physical-layer intrusion detection for wireless networks using compressed sensing

A Fragkiadakis, S Nikitaki… - 2012 IEEE 8th …, 2012 - ieeexplore.ieee.org
The broadcast nature of wireless networks has been widely exploited by adversaries in
order to cause severe denial-of-service attacks. Several algorithms are proposed in the …