Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (120)

Search Parameters:
Keywords = Wi-Fi IEEE 802.11

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
32 pages, 3108 KB  
Article
Blockchain-Integrated Secure Authentication Framework for Smart Grid IoT Using Energy-Aware Consensus Mechanisms
by Omar Abdullah Saleh and Mesut Cevik
Sensors 2025, 25(21), 6622; https://doi.org/10.3390/s25216622 - 28 Oct 2025
Viewed by 243
Abstract
Integrating IoT devices into smart grids raises some hard problems related to safe data sharing, the ability to grow, and energy use. Blockchain provides a safe way to check identities without a central authority. Typical ways to confirm transactions, like Proof-of-Work (PoW), use [...] Read more.
Integrating IoT devices into smart grids raises some hard problems related to safe data sharing, the ability to grow, and energy use. Blockchain provides a safe way to check identities without a central authority. Typical ways to confirm transactions, like Proof-of-Work (PoW), use a lot of power, making them bad for devices that cannot use much energy. This study introduces a safe authentication system using Blockchain, a Deep Neural Network (DNN), and a power-saving way to confirm transactions (EACM). The system picks validators based on how much power they have left and their trust scores to save power during confirmation. Using the IoT-Enabled Smart Grid Dataset, simulations showed a transaction speed of 372 TPS, which is 32% better than normal methods. The system correctly authenticates 98.69% of the time, with a confirmation delay of 5.9 milliseconds and an 18% drop in validator node energy use. Also, the system spots 98.4% of unauthorized access tries, with a false acceptance rate (FAR) of 1.7% and a false rejection rate (FRR) of 0.31%. These outcomes prove the system’s ability to offer safe, fast, and energy-saving authentication for big, real-time Smart Grid IoT setups. Full article
(This article belongs to the Special Issue AI-Driven Security and Privacy for IIoT Applications)
Show Figures

Figure 1

18 pages, 2031 KB  
Article
The Impact of Security Protocols on TCP/UDP Throughput in IEEE 802.11ax Client–Server Network: An Empirical Study
by Nurul I. Sarkar, Nasir Faiz and Md Jahan Ali
Electronics 2025, 14(19), 3890; https://doi.org/10.3390/electronics14193890 - 30 Sep 2025
Viewed by 575
Abstract
IEEE 802.11ax (Wi-Fi 6) technologies provide high capacity, low latency, and increased security. While many network researchers have examined Wi-Fi security issues, the security implications of 802.11ax have not been fully explored yet. Therefore, in this paper, we investigate how security protocols (WPA2, [...] Read more.
IEEE 802.11ax (Wi-Fi 6) technologies provide high capacity, low latency, and increased security. While many network researchers have examined Wi-Fi security issues, the security implications of 802.11ax have not been fully explored yet. Therefore, in this paper, we investigate how security protocols (WPA2, WPA3) affect TCP/UDP throughput in IEEE 802.11ax client–server networks using a testbed approach. Through an extensive performance study, we analyze the effect of security on transport layer protocol (TCP/UDP), internet protocol layer (IPV4/IPV6), and operating systems (MS Windows and Linux) on system performance. The impact of packet length on system performance is also investigated. The obtained results show that WPA3 offers greater security, and its impact on TCP/UDP throughput is insignificant, highlighting the robustness of WPA3 encryption in maintaining throughput even in secure environments. With WPA3, UDP offers higher throughput than TCP and IPv6 consistently outperforms IPv4 in terms of both TCP and UDP throughput. Linux outperforms Windows in all scenarios, especially with larger packet sizes and IPv6 traffic. These results suggest that WPA3 provides optimized throughput performance in both Linux and MS Windows in 802.11ax client–server environments. Our research provides some insights into the security issues in Gigabit Wi-Fi that can help network researchers and engineers to contribute further towards developing greater security for next-generation wireless networks. Full article
Show Figures

Figure 1

24 pages, 5199 KB  
Article
Analysis and Proposal of Strategies for the Management of Drone Swarms Through Wi-Fi Technologies
by Guido Betcher-Sbrolla, Elena Lopez-Aguilera and Eduard Garcia-Villegas
Drones 2025, 9(8), 584; https://doi.org/10.3390/drones9080584 - 18 Aug 2025
Viewed by 1234
Abstract
The main purpose of this paper is to explore the benefits of combining two radio interfaces onboard an unmanned aerial vehicle (UAV) to communicate with a ground control station (GCS) and other UAVs inside a swarm. The goals are to use the IEEE [...] Read more.
The main purpose of this paper is to explore the benefits of combining two radio interfaces onboard an unmanned aerial vehicle (UAV) to communicate with a ground control station (GCS) and other UAVs inside a swarm. The goals are to use the IEEE 802.11ah standard (Wi-Fi HaLow) combined with the IEEE 802.11ax specification (Wi-Fi 6/6E) to enable real-time video transmission from UAVs to the GCS. While airport runway inspection serves as the proof-of-concept use case, the proposed multi-hop architectures apply to other medium-range UAV operations (i.e., a few kilometers) requiring real-time video transmission, such as natural disaster relief and agricultural monitoring. Several scenarios in which a UAV swarm performs infrastructure inspection are emulated. During the missions, UAVs have to send real-time video to the GCS through a multi-hop network when some damage in the infrastructure is found. The different scenarios are studied by means of emulation. Emulated scenarios are defined using different network architectures and radio technologies. Once the emulations finish, different performance metrics related to time, energy and the multi-hop video transmission network are analyzed. The capacity of a multi-hop network is a limiting factor for the transmission of high-quality video. As a first contribution, an expression to find this capacity from distances between UAVs in the emulated scenario is found using the NS-3 simulator. Then, this expression is applied in the algorithms in charge of composing the multi-hop network to offer on-demand quality video. However, the main contribution of this work lies in the development of efficient mechanisms for exchanging control information between UAVs and the GCS, and for forming a multi-hop network to transmit video. Full article
Show Figures

Figure 1

28 pages, 113310 KB  
Article
Optimising Wi-Fi HaLow Connectivity: A Framework for Variable Environmental and Application Demands
by Karen Hargreave, Vicky Liu and Luke Kane
Electronics 2025, 14(13), 2733; https://doi.org/10.3390/electronics14132733 - 7 Jul 2025
Viewed by 1156
Abstract
As the number of IoT (Internet of Things) devices continues to grow at an exceptional rate, so does the variety of use cases and operating environments. IoT now plays a crucial role in areas including smart cities, medicine and smart agriculture, where environments [...] Read more.
As the number of IoT (Internet of Things) devices continues to grow at an exceptional rate, so does the variety of use cases and operating environments. IoT now plays a crucial role in areas including smart cities, medicine and smart agriculture, where environments vary to include built environments, forest, paddocks and many more. This research examines how Wi-Fi HaLow can be optimised to support the varying environments and a wide variety of applications. Through examining data from performance evaluation testing conducted in varying environments, a framework has been developed. The framework takes inputs relating to the operating environment and application to produce configuration recommendations relating to ideal channel width, MCS (Modulation and Coding Scheme), GI (Guard Interval), antenna selection and distance between communicating devices to provide the optimal performance to support the given use case. The application of the framework is then demonstrated when applied to three various scenarios. This research demonstrates that through the configuration of a number of parameters, Wi-Fi HaLow is a versatile network technology able to support a broad range of IoT use cases. Full article
(This article belongs to the Special Issue Network Architectures for IoT and Cyber-Physical Systems)
Show Figures

Figure 1

32 pages, 2945 KB  
Article
SelfLoc: Robust Self-Supervised Indoor Localization with IEEE 802.11az Wi-Fi for Smart Environments
by Hamada Rizk and Ahmed Elmogy
Electronics 2025, 14(13), 2675; https://doi.org/10.3390/electronics14132675 - 2 Jul 2025
Viewed by 2008
Abstract
Accurate and scalable indoor localization is a key enabler of intelligent automation in smart environments and industrial systems. In this paper, we present SelfLoc, a self-supervised indoor localization system that combines IEEE 802.11az Round Trip Time (RTT) and Received Signal Strength Indicator [...] Read more.
Accurate and scalable indoor localization is a key enabler of intelligent automation in smart environments and industrial systems. In this paper, we present SelfLoc, a self-supervised indoor localization system that combines IEEE 802.11az Round Trip Time (RTT) and Received Signal Strength Indicator (RSSI) data to achieve fine-grained positioning using commodity Wi-Fi infrastructure. Unlike conventional methods that depend heavily on labeled data, SelfLoc adopts a contrastive learning framework to extract spatially discriminative and temporally consistent representations from unlabeled wireless measurements. The system integrates a dual-contrastive strategy: temporal contrasting captures sequential signal dynamics essential for tracking mobile agents, while contextual contrasting promotes spatial separability by ensuring that signal representations from distinct locations remain well-differentiated, even under similar signal conditions or environmental symmetry. To this end, we design signal-specific augmentation techniques for the physical properties of RTT and RSSI, enabling the model to generalize across environments. SelfLoc also adapts effectively to new deployment scenarios with minimal labeled data, making it suitable for dynamic and collaborative industrial applications. We validate the effectiveness of SelfLoc through experiments conducted in two realistic indoor testbeds using commercial Android devices and seven Wi-Fi access points. The results demonstrate that SelfLoc achieves high localization precision, with a median error of only 0.55 m, and surpasses state-of-the-art baselines by at least 63.3% with limited supervision. These findings affirm the potential of SelfLoc to support spatial intelligence and collaborative automation, aligning with the goals of Industry 4.0 and Society 5.0, where seamless human–machine interactions and intelligent infrastructure are key enablers of next-generation smart environments. Full article
(This article belongs to the Special Issue Collaborative Intelligent Automation System for Smart Industry)
Show Figures

Figure 1

24 pages, 3481 KB  
Article
Exploring the Potential of Wi-Fi in Industrial Environments: A Comparative Performance Analysis of IEEE 802.11 Standards
by Luis M. Bartolín-Arnau, Federico Orozco-Santos, Víctor Sempere-Payá, Javier Silvestre-Blanes, Teresa Albero-Albero and David Llacer-Garcia
Telecom 2025, 6(2), 40; https://doi.org/10.3390/telecom6020040 - 5 Jun 2025
Cited by 2 | Viewed by 2697
Abstract
The advent of Industry 4.0 brought about digitalisation and the integration of advanced technologies into industrial processes, with wireless networks emerging as a key enabler in the interconnection of smart devices, cyber–physical systems, and data analytics platforms. With the development of Industry 5.0 [...] Read more.
The advent of Industry 4.0 brought about digitalisation and the integration of advanced technologies into industrial processes, with wireless networks emerging as a key enabler in the interconnection of smart devices, cyber–physical systems, and data analytics platforms. With the development of Industry 5.0 and its emphasis on human–machine collaboration, Wi-Fi has positioned itself as a viable alternative for industrial wireless connectivity, supporting seamless communication between robots, automation systems, and human operators. However, its adoption in critical applications remains limited due to persistent concerns over latency, reliability, and interference in shared-spectrum environments. This study evaluates the practical performance of Wi-Fi standards from 802.11n (Wi-Fi 4) to 802.11be (Wi-Fi 7) across three representative environments: residential, laboratory, and industrial. Six configurations were tested under consistent conditions, covering various frequency bands, channel widths, and traffic types. Results prove that Wi-Fi 6/6E delivers the best overall performance, particularly in low-interference 6 GHz scenarios. Wi-Fi 5 performs well in medium-range settings but is more sensitive to congestion, while Wi-Fi 4 consistently underperforms. Early Wi-Fi 7 hardware does not yet surpass Wi-Fi 6/6E consistently, reflecting its ongoing development. Despite these variations, the progression observed across generations clearly demonstrates incremental gains in throughput stability and latency control. While these improvements already provide tangible benefits for many industrial communication scenarios, the most significant leap in industrial applicability is expected to come from the effective implementation of high-efficiency mechanisms. These include OFDMA, TWT, scheduled uplink access, and enhanced QoS features. These capabilities, already embedded in the Wi-Fi 6 and 7 standards, represent the necessary foundation to move beyond conventional best-effort connectivity and toward supporting critical, latency-sensitive industrial applications. Full article
Show Figures

Figure 1

19 pages, 1324 KB  
Article
How Precisely Can One Infer the Position of a Wi-Fi RTT Device by Eavesdropping on Its FTM Frames?
by Enrica Zola and Olga León
Electronics 2025, 14(8), 1540; https://doi.org/10.3390/electronics14081540 - 10 Apr 2025
Viewed by 1824
Abstract
Until the implementation of the IEEE 802.11az standard in common devices becomes a reality, the IEEE 802.11mc fine time measurement (FTM) procedure used for location purposes in indoor environments may be easily compromised by an adversary. Despite the scarce amount of work focusing [...] Read more.
Until the implementation of the IEEE 802.11az standard in common devices becomes a reality, the IEEE 802.11mc fine time measurement (FTM) procedure used for location purposes in indoor environments may be easily compromised by an adversary. Despite the scarce amount of work focusing on the security of the FTM procedure, in the first place, this paper provides an overview of the vulnerabilities that have been studied so far. Lack of encryption and authentication allows an attacker to eavesdrop on any FTM session and/or forge the frame exchange. But how critical can this be? We study the situation where an adversary is able to overhear the FTM frames of a legitimate user that is positioning itself. On the one hand, we show that the adversary is able to easily infer the position of the victim. Moreover, simulation results show that this calculated position can be obtained with a 99th percentile error of 1 m even under the presence of errors in the time measurements, raising significant concern about the security of the current implementation of the protocol. Full article
(This article belongs to the Special Issue Security and Privacy in Location-Based Service)
Show Figures

Figure 1

31 pages, 5218 KB  
Article
KAN-ResNet-Enhanced Radio Frequency Fingerprint Identification with Zero-Forcing Equalization
by Hongbo Chen, Ruohua Zhou, Qingsheng Yuan, Ziye Guo and Wei Fu
Sensors 2025, 25(7), 2222; https://doi.org/10.3390/s25072222 - 1 Apr 2025
Cited by 3 | Viewed by 1602
Abstract
Radio Frequency Fingerprint Identification (RFFI) is a promising device authentication technique that utilizes inherent hardware flaws in transmitters to achieve device identification, thus effectively maintaining the security of the Internet of Things (IoT). However, time-varying channels degrade accuracy due to factors like device [...] Read more.
Radio Frequency Fingerprint Identification (RFFI) is a promising device authentication technique that utilizes inherent hardware flaws in transmitters to achieve device identification, thus effectively maintaining the security of the Internet of Things (IoT). However, time-varying channels degrade accuracy due to factors like device aging and environmental changes. To address this, we propose an RFFI method integrating Zero-Forcing (ZF) equalization and KAN-ResNet. Firstly, the Wi-Fi preamble signals under the IEEE 802.11 standard are Zero-Forcing equalized, so as to effectively reduce the interference of time-varying channels on RFFI. We then design a novel residual network, KAN-ResNet, which adds a KAN module on top of the traditional fully connected layer. The module combines the B-spline basis function and the traditional activation function Sigmoid Linear Unit (SiLU) to realize the nonlinear mapping of the complex function, which enhance the classification ability of the network for RFF features. In addition, to improve the generalization of the model, the grid of B-splines is dynamically updated and L1 regularization is introduced. Experiments show that on datasets collected 20 days apart, our method achieves 99.4% accuracy, reducing the error rate from 6.3% to 0.6%, outperforming existing models. Full article
(This article belongs to the Special Issue Data Protection and Privacy in Industry 4.0 Era)
Show Figures

Figure 1

20 pages, 8921 KB  
Article
A Survey of IEEE 802.11ax WLAN Temporal Duty Cycle for the Assessment of RF Electromagnetic Exposure
by Yizhen Yang, Günter Vermeeren, Leen Verloock, Mònica Guxens and Wout Joseph
Appl. Sci. 2025, 15(5), 2858; https://doi.org/10.3390/app15052858 - 6 Mar 2025
Viewed by 2487
Abstract
The increasing deployment of IEEE 802.11ax (Wi-Fi 6) networks necessitates an accurate assessment of radiofrequency electromagnetic field (RF-EMF) exposure under realistic usage scenarios. This study investigates the duty cycle (DC) and corresponding exposure levels of Wi-Fi 6 in controlled laboratory conditions, focusing on [...] Read more.
The increasing deployment of IEEE 802.11ax (Wi-Fi 6) networks necessitates an accurate assessment of radiofrequency electromagnetic field (RF-EMF) exposure under realistic usage scenarios. This study investigates the duty cycle (DC) and corresponding exposure levels of Wi-Fi 6 in controlled laboratory conditions, focusing on bandwidth variations, multi-user scenarios, and application types. DC measurements reveal significant variability across internet services, with FTP upload exhibiting the highest mean DC (94.3%) under 20 MHz bandwidth, while YouTube 4K video streaming showed bursts with a maximum DC of 89.2%. Under poor radio conditions, DC increased by up to 5× for certain applications, emphasizing the influence of degraded signal-to-noise ratio (SNR) on retransmissions and modulation. Weighted exposure results indicate a reduction in average electric-field strength by up to 10× when incorporating DC, with maximum weighted exposure at 4.2 V/m (6.9% of ICNIRP limits) during multi-user scenarios. These findings highlight the critical role of realistic DC assessments in refining exposure evaluations, ensuring regulatory compliance, and advancing the understanding of Wi-Fi 6’s EMF exposure implications. Full article
(This article belongs to the Special Issue Electromagnetic Radiation and Human Environment)
Show Figures

Figure 1

24 pages, 1016 KB  
Article
MILD: Minimizing Idle Listening Energy Consumption via Down-Clocking for Energy-Efficient Wi-Fi Communications
by Jae-Hyeon Park, Young-Joo Suh, Dongdeok Kim, Harim Lee, Hyeongtae Ahn and Young Deok Park
Sensors 2025, 25(4), 1155; https://doi.org/10.3390/s25041155 - 13 Feb 2025
Viewed by 1818
Abstract
Mobile devices, such as smartphones and laptops, face energy consumption challenges due to battery limitations, with Wi-Fi being one of the major sources of energy consumption in these devices. The IEEE 802.11 standard addresses this issue with Power Saving Mode (PSM), which reduces [...] Read more.
Mobile devices, such as smartphones and laptops, face energy consumption challenges due to battery limitations, with Wi-Fi being one of the major sources of energy consumption in these devices. The IEEE 802.11 standard addresses this issue with Power Saving Mode (PSM), which reduces power consumption but increases latency. To mitigate this latency, Adaptive-PSM (A-PSM) dynamically switches between PSM and Constantly Awake Mode (CAM); however, the associated Idle Listening (IL) process still results in high energy consumption. Various strategies have been proposed to optimize IL time; however, Medium Access Control (MAC)-level contention and network delays limit their effectiveness. To overcome these limitations, we propose MILD (Minimizing Idle Listening energy consumption via Down-clocking), a novel scheme that reduces energy consumption without compromising throughput. MILD introduces specialized preambles for Packet Arrival Detection (PAD) and Device Address Recognition (DAR), allowing the client to operate in a down-clocked state during IL and switch to full clocking only when necessary. Experimental results demonstrate that MILD reduces energy consumption by up to 23.6% while maintaining a minimal throughput loss of 12.5%, outperforming existing schemes. Full article
(This article belongs to the Special Issue Energy-Efficient Communication Networks and Systems: 2nd Edition)
Show Figures

Figure 1

36 pages, 2688 KB  
Article
StegoEDCA: An Efficient Covert Channel for Smart Grids Based on IEEE 802.11e Standard
by Marek Natkaniec and Paweł Kępowicz
Energies 2025, 18(2), 330; https://doi.org/10.3390/en18020330 - 13 Jan 2025
Cited by 1 | Viewed by 1298
Abstract
Smart grids are continuously evolving, incorporating modern technologies such as Wi-Fi, Zigbee, LoRaWAN or BLE. Wi-Fi are commonly used to transmit data from measurement systems, distribution control and monitoring systems, as well as network protection systems. However, since Wi-Fi networks primarily operate on [...] Read more.
Smart grids are continuously evolving, incorporating modern technologies such as Wi-Fi, Zigbee, LoRaWAN or BLE. Wi-Fi are commonly used to transmit data from measurement systems, distribution control and monitoring systems, as well as network protection systems. However, since Wi-Fi networks primarily operate on unlicensed frequency bands, this introduces significant security risks for sensitive data transmission. In this paper, we propose a novel and highly efficient covert channels that utilize IEEE 802.11 Enhanced Distributed Channel Access (EDCA) for data transmission. It is also the first ever covert channel that employ three or four independent covert mechanisms to enhance operational efficiency. The proposed mechanism is also the first to exploit the Transmission Opportunity (TXOP) period and the access categories of the EDCA function. The protocol was developed and tested using the ns-3 simulator, achieving excellent performance results. Its efficiency remains consistent even under heavy network load with additional background traffic. These covert channels provide an innovative solution for securely transmitting large volumes of data within the smart grid. Full article
(This article belongs to the Special Issue Research on Security and Data Protection for Energy Systems)
Show Figures

Figure 1

30 pages, 2272 KB  
Article
Embedding Trust in the Media Access Control Protocol for Wireless Networks
by Chaminda Alocious, Hannan Xiao, Bruce Christianson and Joseph Spring
Sensors 2025, 25(2), 354; https://doi.org/10.3390/s25020354 - 9 Jan 2025
Viewed by 1053
Abstract
IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.11 have been designed under the assumption that all nodes in the network are cooperative [...] Read more.
IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.11 have been designed under the assumption that all nodes in the network are cooperative and trustworthy. However, the potential for non-cooperative nodes exists, nodes that may purposefully misbehave in order to, for example, obtain extra bandwidth, conserve their resources, or disrupt network performance. This issue is further compounded when receivers such as Wi-Fi hotspots, normally trusted by other module nodes, also misbehave. Such issues, their detection, and mitigation have, we believe, not been sufficiently addressed in the literature. This research proposes a novel trust-incorporated MAC protocol (TMAC) which detects and mitigates complex node misbehavior for distributed network environments. TMAC introduces three main features into the original IEEE 802.11 protocol. First, each node assesses a trust level for their neighbors, establishing a verifiable backoff value generation mechanism with an incorporated trust model involving senders, receivers, and common neighbors. Second, TMAC uses a collaborative penalty scheme to penalize nodes that deviate from the IEEE 802.11 protocol. This feature removes the assumption of a trusted receiver. Third, a TMAC diagnosis mechanism is carried out for each distributed node periodically, to reassess neighbor status and to reclassify each based on their trust value. Simulation results in ns2 showed that TMAC is effective in diagnosing and starving selfish or misbehaving nodes in distributed wireless networks, improving the performance of trustworthy well-behaving nodes. The significant feature of TMAC is its ability to detect sender, receiver, and colluding node misbehavior at the MAC layer with a high level of accuracy, without the need to trust any of the communicating parties. Full article
(This article belongs to the Special Issue Innovative Approaches to Cybersecurity for IoT and Wireless Networks)
Show Figures

Figure 1

13 pages, 4866 KB  
Article
Design of a Low-Cost and High-Precision Measurement System Suitable for Organic Transistors
by Vratislav Režo and Martin Weis
Electronics 2024, 13(22), 4475; https://doi.org/10.3390/electronics13224475 - 14 Nov 2024
Cited by 1 | Viewed by 1543
Abstract
Organic field-effect transistors (OFETs) require ultra-precise electrical measurements due to their unique charge transport mechanisms and sensitivity to environmental factors, yet commercial semiconductor parameter analysers capable of such measurements are prohibitively expensive for many research laboratories. This study introduces a novel, cost-effective, and [...] Read more.
Organic field-effect transistors (OFETs) require ultra-precise electrical measurements due to their unique charge transport mechanisms and sensitivity to environmental factors, yet commercial semiconductor parameter analysers capable of such measurements are prohibitively expensive for many research laboratories. This study introduces a novel, cost-effective, and portable setup for high-precision OFET characterisation that addresses this critical need, providing a feasible substitute for conventional analysers costing tens of thousands of dollars. The suggested system incorporates measurement, data processing, and graphical visualisation capabilities, together with Bluetooth connectivity for local operation and Wi-Fi functionality for remote data monitoring. The device consists of a motherboard and specialised cards for low-current measurement, voltage measurement, and voltage generation, providing comprehensive OFET characterisation, including transfer and output characteristics, in accordance with IEEE-1620 standards. The system can measure current from picoamperes to milliamperes, with voltage measurements supported by high input resistance (>100 MΩ) and a voltage generation range of −30 V to +30 V. This versatile and accessible approach greatly improves the opportunities for future OFET research and development. Full article
Show Figures

Figure 1

18 pages, 8730 KB  
Article
A Novel Non-Contact Multi-User Online Indoor Positioning Strategy Based on Channel State Information
by Yixin Zhuang, Yue Tian and Wenda Li
Sensors 2024, 24(21), 6896; https://doi.org/10.3390/s24216896 - 27 Oct 2024
Cited by 1 | Viewed by 1916
Abstract
The IEEE 802.11bf-based wireless fidelity (WiFi) indoor positioning system has gained significant attention recently. It is important to recognize that multi-user online positioning occurs in real wireless environments. This paper proposes an indoor positioning sensing strategy that includes an optimized preprocessing process and [...] Read more.
The IEEE 802.11bf-based wireless fidelity (WiFi) indoor positioning system has gained significant attention recently. It is important to recognize that multi-user online positioning occurs in real wireless environments. This paper proposes an indoor positioning sensing strategy that includes an optimized preprocessing process and a new machine learning (ML) method called NKCK. The NKCK method can be broken down into three components: neighborhood component analysis (NCA) for dimensionality reduction, K-means clustering, and K-nearest neighbor (KNN) classification with cross-validation (CV). The KNN algorithm is particularly suitable for our dataset since it effectively classifies data based on proximity, relying on the spatial relationships between points. Experimental results indicate that the NKCK method outperforms traditional methods, achieving reductions in error rates of 82.4% compared to naive Bayes (NB), 85.0% compared to random forest (RF), 72.1% compared to support vector machine (SVM), 64.7% compared to multilayer perceptron (MLP), 50.0% compared to density-based spatial clustering of applications with noise (DBSCAN)-based methods, 42.0% compared to linear discriminant analysis (LDA)-based channel state information (CSI) amplitude fingerprinting, and 33.0% compared to principal component analysis (PCA)-based approaches. Due to the sensitivity of CSI, our multi-user online positioning system faces challenges in detecting dynamic human activities, such as human tracking, which requires further investigation in the future. Full article
Show Figures

Figure 1

19 pages, 8517 KB  
Article
Data Mining Approach for Evil Twin Attack Identification in Wi-Fi Networks
by Roman Banakh, Elena Nyemkova, Connie Justice, Andrian Piskozub and Yuriy Lakh
Data 2024, 9(10), 119; https://doi.org/10.3390/data9100119 - 14 Oct 2024
Cited by 1 | Viewed by 5445
Abstract
Recent cyber security solutions for wireless networks during internet open access have become critically important for personal data security. The newest WPA3 network security protocol has been used to maximize this protection; however, attackers can use an Evil Twin attack to replace a [...] Read more.
Recent cyber security solutions for wireless networks during internet open access have become critically important for personal data security. The newest WPA3 network security protocol has been used to maximize this protection; however, attackers can use an Evil Twin attack to replace a legitimate access point. The article is devoted to solving the problem of intrusion detection at the OSI model’s physical layers. To solve this, a hardware–software complex has been developed to collect information about the signal strength from Wi-Fi access points using wireless sensor networks. The collected data were supplemented with a generative algorithm considering all possible combinations of signal strength. The k-nearest neighbor model was trained on the obtained data to distinguish the signal strength of legitimate from illegitimate access points. To verify the authenticity of the data, an Evil Twin attack was physically simulated, and a machine learning model analyzed the data from the sensors. As a result, the Evil Twin attack was successfully identified based on the signal strength in the radio spectrum. The proposed model can be used in open access points as well as in large corporate and home Wi-Fi networks to detect intrusions aimed at substituting devices in the radio spectrum where IEEE 802.11 networking equipment operates. Full article
(This article belongs to the Section Information Systems and Data Management)
Show Figures

Figure 1

Back to TopTop