Articles with "design secure" as a keyword



Photo from wikipedia

Security Challenges of Selective Forwarding Attack and Design a Secure ECDH-Based Authentication Protocol to Improve RPL Security

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2022.3221434

Abstract: Today, we could describe the Internet of Things (loT) as the pervasive and global network that provides a system for monitoring, controlling, processing, and analyzing the data generated by IoT devices. The huge amount of… read more here.

Keywords: authentication; selective forwarding; security; design secure ... See more keywords
Photo by edhoradic from unsplash

Joint Transmit and Reflective Beamformer Design for Secure Estimation in IRS-Aided WSNs

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Signal Processing Letters"

DOI: 10.1109/lsp.2022.3147139

Abstract: Wireless sensor networks (WSNs) are vulnerable to eavesdropping as the sensor nodes (SNs) communicate over an open radio channel. Intelligent reflecting surface (IRS) technology can be leveraged for physical layer security in WSNs. In this… read more here.

Keywords: reflective beamformer; joint transmit; design secure; transmit reflective ... See more keywords
Photo from wikipedia

Co-Design Secure Control Based on Image Attack Detection and Data Compensation for Networked Visual Control Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Instrumentation and Measurement"

DOI: 10.1109/tim.2022.3206760

Abstract: The incomplete and untrue data caused by cyberattacks (e.g., image information leakage and tampering) will affect the control performance and even lead to system instability. To address this problem, a novel co-design secure control method… read more here.

Keywords: secure control; compensation; control; detection ... See more keywords