Security of open radio access networks
Abstract The Open Radio Access Network (O-RAN) is a promising radio access network
(RAN) architecture aimed at resha** the RAN industry toward an open, adaptive, and …
(RAN) architecture aimed at resha** the RAN industry toward an open, adaptive, and …
Evaluating the security of open radio access networks
[PDF][PDF] Physical layer security game: interaction between source, eavesdropper, and friendly jammer
Physical layer security is an emerging security area that achieves perfect secrecy data
transmission between intended network nodes, while malicious nodes that eavesdrop the …
transmission between intended network nodes, while malicious nodes that eavesdrop the …
Spread: Foiling smart jammers using multi-layer agility
In this paper, we address the problem of cross-layer denial of service attack in wireless data
networks. We introduce SPREAD-a novel adaptive diversification approach to provide …
networks. We introduce SPREAD-a novel adaptive diversification approach to provide …
Disrupting MIMO communications with optimal jamming signal design
This paper considers the problem of intelligent jamming attack on a MIMO wireless
communication link with a transmitter, a receiver, and an adversarial jammer, each equipped …
communication link with a transmitter, a receiver, and an adversarial jammer, each equipped …
On the vulnerabilities of CSI in MIMO wireless communication systems
R Miller, W Trappe - IEEE Transactions on mobile Computing, 2011 - ieeexplore.ieee.org
Multiple-input multiple-output (MIMO) technologies are a popular choice for emerging
wireless systems due to their promised gains in throughput and reliability. In order to realize …
wireless systems due to their promised gains in throughput and reliability. In order to realize …
Physical layer security game: How to date a girl with her boyfriend on the same table
Physical layer security is an emerging security concept that achieves perfect secrecy data
transmission between the intended network nodes, while the eavesdrop** malicious …
transmission between the intended network nodes, while the eavesdrop** malicious …
Suppression of multiple spatially correlated jammers
Effective suppression of inadvertent or deliberate jamming signals is crucial to ensure
reliable wireless communication. However, as demonstrated in this paper, when the …
reliable wireless communication. However, as demonstrated in this paper, when the …
Antieavesdrop** with selfish jamming in wireless networks: A Bertrand game approach
Wireless communications are vulnerable to eavesdrop** attacks due to their broadcast
nature. To deal with their emerging challenge of physical layer security, in this paper, we …
nature. To deal with their emerging challenge of physical layer security, in this paper, we …
Efficient jamming attacks on MIMO channels
This paper investigates efficient jamming attacks against MIMO-enabled systems. Previous
research has focused on jamming data transmissions. We instead focus on jamming …
research has focused on jamming data transmissions. We instead focus on jamming …