Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On physical-layer identification of wireless devices
Physical-layer device identification aims at identifying wireless devices during radio
communication by exploiting unique characteristics of their analog (radio) circuitry. This work …
communication by exploiting unique characteristics of their analog (radio) circuitry. This work …
[PDF][PDF] Relay attacks on passive keyless entry and start systems in modern cars
We demonstrate relay attacks on Passive Keyless Entry and Start (PKES) systems used in
modern cars. We build two efficient and inexpensive attack realizations, wired and wireless …
modern cars. We build two efficient and inexpensive attack realizations, wired and wireless …
Secure vehicular communication systems: design and architecture
Significant developments have taken place over the past few years in the area of vehicular
communication systems. Now, it is well understood in the community that security and …
communication systems. Now, it is well understood in the community that security and …
Enabling cyber‐physical communication in 5G cellular networks: challenges, spatial spectrum sensing, and cyber‐security
Cyber‐physical systems (CPS) help create new services and applications by revolutionising
our world in different fields through their tight interactions and automated decisions. This is …
our world in different fields through their tight interactions and automated decisions. This is …
Securearray: Improving wifi security with fine-grained physical-layer information
Despite the important role that WiFi networks play in home and enterprise networks they are
relatively weak from a security standpoint. With easily available directional antennas …
relatively weak from a security standpoint. With easily available directional antennas …
On attacker models and profiles for cyber-physical systems
Attacker models are a fundamental part of research on security of any system. For different
application scenarios, suitable attacker models have to be chosen to allow comprehensive …
application scenarios, suitable attacker models have to be chosen to allow comprehensive …
Neighbor discovery in traditional wireless networks and cognitive radio networks: Basics, taxonomy, challenges and future research directions
Cognitive radio network is designed to opportunistically exploit the licensed band. To deploy
a cognitive radio network, nodes need to perform the neighbor discovery process in order to …
a cognitive radio network, nodes need to perform the neighbor discovery process in order to …
A survey of wormhole-based attacks and their countermeasures in wireless sensor networks
In wormhole attacks, attackers create a low-latency link between two points in the network.
This can be achieved by either compromising two or more sensor nodes of the network or …
This can be achieved by either compromising two or more sensor nodes of the network or …
Channel-based physical layer authentication
In this paper, we study channel-based authentication, where the receiver can identify and
authenticate the senders through channel vectors estimated from their frames. The …
authenticate the senders through channel vectors estimated from their frames. The …
Cooperative location privacy in vehicular networks: Why simple mix zones are not enough
Vehicular communications disclose rich information about the vehicles and their
whereabouts. Pseudonymous authentication secures communication while enhancing user …
whereabouts. Pseudonymous authentication secures communication while enhancing user …