Proxy smart contracts for zero trust architecture implementation in Decentralised Oracle Networks based applications

A Gupta, R Gupta, D Jadav, S Tanwar, N Kumar… - Computer …, 2023 - Elsevier
Implementation of blockchain is quickly finding popularity in several real-world applications.
As a result, in order to execute and process smart contracts, blockchains frequently …

Wireless sensing applications with Wi-Fi channel state information, preprocessing techniques, and detection algorithms: a survey

JA Armenta-Garcia, FF Gonzalez-Navarro… - Computer …, 2024 - Elsevier
Abstract Recently, using Wi-Fi devices as sensing technology has garnered significant
attention and found numerous applications. This trend has given birth to what is known as …

Integration of Sensing and Localization in V2X Sidelink Communications

S Bartoletti, N Decarli, BM Masini… - IEEE …, 2024 - ieeexplore.ieee.org
This article investigates the evolution of vehicle-to-everything (V2X) sidelink
communications technology, focusing on its integration with sensing and localization …

WiCloak: Protect Location Privacy of WiFi Devices

J Jiang, J Wang, Y Liu, Y Chen… - 2024 23rd ACM/IEEE …, 2024 - ieeexplore.ieee.org
The rapid development of WiFi localization poses a serious privacy threat, as eavesdroppers
can locate WiFi devices without their consent. In this paper, we present WiCloak, the first …

Communication and Sensing: Wireless PHY-Layer Threats to Security and Privacy for IoT Systems and Possible Countermeasures.

R Lo Cigno, F Gringoli, S Bartoletti… - Information (2078 …, 2025 - search.ebscohost.com
Recent advances in signal processing and AI-based inference enable the exploitation of
wireless communication signals to collect information on devices, people, actions, and the …

On the Capacity of Scalar Gaussian Channels Subject to State Obfuscation

O Lev, M Ho, L Wang… - 2024 60th Annual Allerton …, 2024 - ieeexplore.ieee.org
We study communication over the scalar Gaussian fading channel subject to a state-
obfuscation constraint, which requires that the channel outputs and the fading coefficients be …

[PDF][PDF] Communication and Sensing: PHY Layer Threats to Security and Privacy for IoT Systems, and Possible Countermeasures

RL Cigno, F Gringoli, S Bartoletti, M Cominelli, L Ghiro… - 2024 - preprints.org
Recent advances in signal processing and AI-based inference enable the exploitation of
communication signals to collect information on devices, people, actions and the …

WiFi sensing: risk and potential on IT-security and privacy

K Osenstätter - 2024 - opus4.kobv.de
As wireless networks increasingly supplant stationary network infrastructures, and with the
burgeoning proliferation of devices capable of wireless communication, the significance of …