Articles with "emulation attack" as a keyword



Photo from wikipedia

Countermeasures for Primary User Emulation Attack: A Comprehensive Review

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Personal Communications"

DOI: 10.1007/s11277-020-07600-y

Abstract: Cognitive radio (CR) is a flexible wireless network that can solve the scarcity and underutilization problem of the spectrum by permitting unlicensed users to access licensed bands. The dynamic nature of CR makes it more… read more here.

Keywords: primary user; user emulation; emulation attack; countermeasures primary ... See more keywords
Photo by nampoh from unsplash

Signal Emulation Attack and Defense for Smart Home IoT

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2022.3169705

Abstract: Internet of Things (IoT) is transforming every corner of our daily life and plays important roles in the smart home. Depending on different requirements on wireless transmission, dedicated wireless protocols have been adopted on various… read more here.

Keywords: emulation attack; signal emulation; defense; attack ... See more keywords