2021
DOI: 10.1109/ojcoms.2021.3054066
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Communication, Sensing, and REM: A Security Perspective

Abstract: The diverse requirements of next-generation communication systems necessitate awareness, flexibility, and intelligence as essential building blocks of future wireless networks. The awareness can be obtained from the radio signals in the environment using wireless sensing and radio environment mapping (REM) methods. This is, however, accompanied by threats such as eavesdropping, manipulation, and disruption posed by malicious attackers. To this end, this work analyzes the wireless sensing and radio environment … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 35 publications
(17 citation statements)
references
References 154 publications
0
17
0
Order By: Relevance
“…Using the pilots P (k) at k p , the precoded CFR Habe (k) = H ae (k)H ap ab (k) is estimated as described in (5). As seen from ( 15), eavesdropper will not be able to correctly estimates the channel because of unknown randomness caused by all-pass component (H ap ab (k)) of legitimate channel in (15).…”
Section: Proposed Pilot Security Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Using the pilots P (k) at k p , the precoded CFR Habe (k) = H ae (k)H ap ab (k) is estimated as described in (5). As seen from ( 15), eavesdropper will not be able to correctly estimates the channel because of unknown randomness caused by all-pass component (H ap ab (k)) of legitimate channel in (15).…”
Section: Proposed Pilot Security Methodsmentioning
confidence: 99%
“…The first goal of PLS algorithms is to degrade the data decoding capability of non-legitimate nodes compared to the legitimate node by exploiting different properties of the wireless channel. While the second goal is to enforce poor channel estimation at the eavesdropper/attacker, which will degrade the signal recovery capability at the attacker [5]- [7].…”
Section: A Pls Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…A large-scale analysis of vehicular data can lead to valuable insights that address public transportation challenges and come across new scientific discoveries [43]. However, as a nontrivial combination and extension built upon existing infrastructures and technologies, it is inevitable that some issues remain in 5GVNs, especially privacy issues [44], [45], [46], [47], [48], [49], [50], [51]. SPs may have malicious or mischievous employees who steal users' data and sell them to the black market.…”
Section: Introductionmentioning
confidence: 99%