UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 11
1.
Celotno besedilo
2.
  • Jamming Attacks Reliable Pr... Jamming Attacks Reliable Prevention in a Clustered Wireless Sensor Network
    Cordero, Claudio Valencia; Lisser, Abdel Wireless personal communications, 12/2015, Letnik: 85, Številka: 3
    Journal Article
    Recenzirano

    A heterogeneous wireless sensor network attacked by jamming is analyzed as a two-player non-cooperative game chance constrained problem, the utility function is based on the signal interference plus ...
Celotno besedilo
3.
  • Clustering-Based Energy-Eff... Clustering-Based Energy-Efficient Self-Healing Strategy for WSNs Under Jamming Attacks
    López-Vilos, Nicolás; Valencia-Cordero, Claudio; Souza, Richard Demo ... Sensors (Basel, Switzerland), 08/2023, Letnik: 23, Številka: 15
    Journal Article
    Recenzirano
    Odprti dostop

    The Internet of Things (IoT) is a key technology to interconnect the real and digital worlds, enabling the development of smart cities and services. The timely collection of data is essential for IoT ...
Celotno besedilo
4.
  • Performance Analysis of the... Performance Analysis of the IEEE 802.15.4 Protocol for Smart Environments under Jamming Attacks
    López-Vilos, Nicolás; Valencia-Cordero, Claudio; Azurdia-Meza, Cesar ... Sensors (Basel, Switzerland), 06/2021, Letnik: 21, Številka: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Jamming attacks in wireless sensor networks (WSNs) scenarios are detrimental to the performance of these networks and affect the security and stability of the service perceived by users. Therefore, ...
Celotno besedilo

PDF
5.
Celotno besedilo
6.
  • Machine Learning Analysis for Side-Channel Attacks over Elliptic Curve Cryptography
    Villegas, Felipe Ignacio Leon; Cordero, Claudio Valencia 2021 IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON), 2021-Dec.-6
    Conference Proceeding

    This paper presents experimental evaluation on various Machine Learning (ML) models used for Simple Power Attacks (SPA) on a device which uses an Elliptic Curve Cryptography (ECC). The device used in ...
Celotno besedilo
7.
  • Secrecy Capacity Bounds Ana... Secrecy Capacity Bounds Analysis for Physical Layer Security Based on Game Theory
    Ortega Silva, Nicolas Matias; Valencia Cordero, Claudio Revista IEEE América Latina, 2018-September, 2018-9-00, Letnik: 16, Številka: 9
    Journal Article

    A wireless communication aided with Cooperative Jamming in order to enhance Physical Layer security is modeled with Game Theory, using Secrecy Capacity as payment function. To completely take in ...
Celotno besedilo
8.
  • BER and SNR based physical layer security analysis with cooperative Jamming
    Corral-Molina, Carlos; Valencia-Cordero, Claudio 2021 IEEE International Conference on Automation/XXIV Congress of the Chilean Association of Automatic Control (ICA-ACCA), 2021-March-22
    Conference Proceeding

    Physical layer security has been widely studied by the scientific community from a theoretical point of view, but the lack of practical metrics that can deliver a quick and easy-to-read response for ...
Celotno besedilo
9.
  • Side Channel Attack Countermeasure for Low Power Devices with AES Encryption
    Ruminot-Ahumada, Nicolas; Valencia-Cordero, Claudio; Abarzua-Ortiz, Rodrigo 2021 IEEE International Conference on Automation/XXIV Congress of the Chilean Association of Automatic Control (ICA-ACCA), 2021-March-22
    Conference Proceeding

    The advancement of Internet of Things produces a massive increase in the use of low-power devices, which can contain sensitive information. Most of these devices do not have the necessary security to ...
Celotno besedilo
10.
  • Constant jamming experimental results on indoor wireless sensor network
    Vilos, Nicolas Alberto Lopez; Cordero, Claudio Valencia 2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON), 2017-Oct.
    Conference Proceeding

    The interference attack or better known as jamming attacks are very easy to implement affecting the service of any wireless communication system given the vulnerability of data sent to the user. This ...
Celotno besedilo
1 2
zadetkov: 11

Nalaganje filtrov