Radio Frequency Fingerprint (RFF) identification is a non-password authentication technique, which have been researched in improving the security of the internet of Things (IoT) widely. For traditional access authenti...
详细信息
ISBN:
(纸本)9798350378412
Radio Frequency Fingerprint (RFF) identification is a non-password authentication technique, which have been researched in improving the security of the internet of Things (IoT) widely. For traditional access authentication technology, invaders can intercept or steal users' private information by impersonating their identities, which poses a great security risk. Therefore, the unique features of RFF have an important role in securing the network. However, existing methods for RFF identification in IoT systems may be ineffective in low signal-to-Noise Ratio (SNR) will result in mobile devices being unrecognized or misrecognized, leading to security vulnerabilities. Therefore, we propose an RFF identification scheme designed for a low SNR environment, using the Swin-Conv-UNet (SCUNet) for RFF identification. The effect of noise on RFF is reduced by denoising the Wigner-Ville Distribution (WVD) time-frequency images. In addition, we choose to conduct experiments on the WiFi signal (WiSig) Dataset with 10 different transmitters and the recognition of different devices is realized by ResNet18. The results show that the proposed method has significant improvement in the SNR range from -6 dB to 0 dB and achieves 91.5% accuracy at SNR = -4 dB.
Since the channel state information (CSI) can provide a fine-grained description of signal propagation process, in this paper, a new CSI fingerprint and graph convolutional network (GCN) based indoor localization algo...
详细信息
The proceedings contain 44 papers. The topics discussed include: blockchain-enabled DNS: enhancing security and mitigating attacks in domain name systems;deep learning-based human tracking, face mask and social distan...
ISBN:
(纸本)9798350329599
The proceedings contain 44 papers. The topics discussed include: blockchain-enabled DNS: enhancing security and mitigating attacks in domain name systems;deep learning-based human tracking, face mask and social distance monitoring, systems using YOLOv5;IMU-based human activity recognition using machine learning and deep learning models;enhancing brain tumor aid diagnosis with augmented reality rendering-based 6 DoF object pose estimation;secure key exchange scheme and blockchain-oriented data protection in the internet of vehicles;an intelligent edge-deployable indoor air quality monitoring and activity recognition approach;DiffT: a novel approach for privacy preserving data analytics;using data integration platform for effective location-aware service development platform;hybrid whale-mud-ring optimization for precise color skin cancer image segmentation;and an extensive evaluation of plant disease detection using diverse machine learning approaches.
The internet of Medical Things in healthcare necessitates a secure way to transfer medical images due to the rise of telemedicine. Security breaches in public networks lead to falsification of medical images and furth...
详细信息
An era of automation is currently being experienced, where everything is becoming more automated day by day. Automation technology has been applied everywhere, from smaller to larger scales. Moreover, real-time commun...
详细信息
The popularity of vehicles and the upgrading of sensors are driving the development of the internet of Vehicles. Therefore, a number of Vehicular Adhoc networks (VANETs) routing algorithms have emerged. However, vehic...
详细信息
The popularity of vehicles and the upgrading of sensors are driving the development of the internet of Vehicles. Therefore, a number of Vehicular Adhoc networks (VANETs) routing algorithms have emerged. However, vehicles in complex road environments are exposed to numerous malicious attacks. Especially in multi-hop communications, these malicious attacks become more dangerous. So it remains a great challenge to transmit the packet safely to the destination through multi-hop routing when a vehicle is in the area outside the Road Side Unit (RSU) signal coverage. Considering the process of past communication between the vehicles benefits our assessment of the vehicle's security. In this paper, we propose a secure multi-hop routing algorithm based on accumulating trust. First, we obtain the number of times the vehicle forwards the packets through neighbor nodes. Then, we calculate the current trust value of the vehicle based on it, and RSUs will put the current trust value into the blockchain to form an accumulating trust value. Finally, the appropriate route is selected for communication based on the accumulating trust value of the vehicular nodes. At the end of the paper, we carry out a simple numerical simulation for our routing algorithm. (c) 2023 The Authors. Published by Elsevier B.V.
Reconfigurable intelligent surfaces (RIS) have emerged as a crucial technology for sixth-generation (6G) communication systems. Mastering the modeling and analysis methods of RIS is essential for its effective impleme...
详细信息
This paper presents the application of computer vision and artificial neural networks for autonomous approach and landing and taxiing for an aircraft. In civil aviation and unmanned aircraft system industry, safety ha...
详细信息
ISBN:
(纸本)9781665464956
This paper presents the application of computer vision and artificial neural networks for autonomous approach and landing and taxiing for an aircraft. In civil aviation and unmanned aircraft system industry, safety has always been the prime concern. We present a system which uses modern pattern recognition algorithm to aid in the landing of all types of aerial vehicles. The auto-land systems used today in aviation sector utilize a radio waves-based system known as Instrument Landing System (ILS) which has been in operation since decades. Although, it is efficient but might sometime be intermittent and is vulnerable to interference. Moreover, the auto-land system works in conjunction with different devices such as radio altimeter, ILS, Global Positioning System (GPS) and others. But, before reaching the Minimum Decision Altitude (MDA), pilots are expected to have the runway threshold marking, aiming point marking, displacement arrows and other touchdown markings/lights in-sight for landing. For this purpose, use of imaging sensors as an augmentation system for pilots during landing can improve the safety manifolds. Our method uses modern artificial neural networks to learn to recognize and localize important visual references during landing and taxiing useful for pilots by utilizing the satellite imagery dataset from Google Earth Engine (GEE) cloud computing.
Traditional traffic signal timing control and single-intersection control methods face challenges in addressing the complexity and dynamics of modern traffic systems. Methods such as Discrete Traffic State Code(DSTE) ...
详细信息
The number of software vulnerabilities have increased rapidly, and their forms have shown the characteristics of complexity and diversity, which has brought severe challenges to software systems. Deep learning can aut...
详细信息
暂无评论