You are currently on the new version of our website. Access the old version .

7,224 Results Found

  • Review
  • Open Access
32 Citations
21,707 Views
45 Pages

A Survey on Satellite Communication System Security

  • Minjae Kang,
  • Sungbin Park and
  • Yeonjoon Lee

1 May 2024

In recent years, satellite communication systems (SCSs) have rapidly developed in terms of their role and capabilities, promoted by advancements in space launch technologies. However, this rapid development has also led to the emergence of significan...

  • Review
  • Open Access
50 Citations
12,951 Views
18 Pages

27 February 2024

Vehicle-to-vehicle (V2V) communication has played a pivotal role in modern intelligent transportation systems, enabling seamless information exchange among vehicles to enhance road safety, traffic efficiency, and overall driving experience. However,...

  • Review
  • Open Access
16 Citations
9,081 Views
17 Pages

26 August 2016

Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions...

  • Essay
  • Open Access
1,560 Views
12 Pages

Semantic communication based on deep learning technology extracts the meaning of the transmitted source to achieve spectrum resource savings and enhance anti-interference capabilities. The black-box nature of deep learning models increases the diffic...

  • Article
  • Open Access
6 Citations
5,676 Views
22 Pages

Robotic systems have been widely used in various industries, so the security of communication between robots and their components has become an issue that needs to be focused on. As a framework for developing robotic systems, the security of ROS2 (Ro...

  • Article
  • Open Access
7 Citations
2,558 Views
27 Pages

Enhancing Communication Security an In-Vehicle Wireless Sensor Network

  • Algimantas Venčkauskas,
  • Marius Taparauskas,
  • Šarūnas Grigaliūnas and
  • Rasa Brūzgienė

Confronting the challenges of securing communication in-vehicle wireless sensor networks demands innovative solutions, particularly as vehicles become more interconnected. This paper proposes a tailored communication security framework for in-vehicle...

  • Article
  • Open Access
7 Citations
2,917 Views
19 Pages

Emulation of Digital Substations Communication for Cyber Security Awareness

  • Filip Holik,
  • Sule Yildirim Yayilgan and
  • Guro Bråten Olsborg

Increasing power consumption and reliance on non-predictable renewable power generation is pushing the transition from analog to digital power grid substations forward. Grid digitalization helps to reduce substation complexity and therefore costs, an...

  • Article
  • Open Access
2 Citations
2,497 Views
17 Pages

Ensuring Corporate Security and Its Strategic Communication in Healthcare Institutions in Slovenia

  • Valentina Kubale,
  • Teja Lobnikar,
  • Branko Gabrovec and
  • Miha Dvojmoč

Ensuring corporate security is an essential and critical component of any healthcare facility to provide safe services to its patients and employees. Healthcare facilities must employ a variety of strategies to ensure corporate security. This include...

  • Article
  • Open Access
30 Citations
6,498 Views
17 Pages

A Novel Security Protocol for Wireless Sensor Networks with Cooperative Communication

  • Abdullah Al Hayajneh,
  • Md Zakirul Alam Bhuiyan and
  • Ian McAndrew

This paper builds upon the foundation and clarifies specifications for a necessary security protocol in Wireless Sensor Networks (WSNs) with cooperative communications. It is designed to enhance performance and resiliency against cyber-attacks. Recen...

  • Article
  • Open Access
5 Citations
1,999 Views
15 Pages

In recent years, chaos-based secure communication systems have garnered significant attention for their unique attributes, including sensitivity to initial conditions and periodic orbit density. However, existing systems face challenges in balancing...

  • Article
  • Open Access
9 Citations
2,933 Views
15 Pages

Lightweight Cryptography for Connected Vehicles Communication Security on Edge Devices

  • Sahbi Boubaker,
  • Faisal S. Alsubaei,
  • Yahia Said and
  • Hossam E. Ahmed

29 September 2023

Recent advances in mobile connection technology have been involved in every aspect of modern life. Even vehicles are becoming more connected, with the ability to communicate without human intervention. The main idea of connected vehicles is to exchan...

  • Article
  • Open Access
23 Citations
4,024 Views
18 Pages

Research of Security Routing Protocol for UAV Communication Network Based on AODV

  • Xiaopeng Tan,
  • Zhen Zuo,
  • Shaojing Su,
  • Xiaojun Guo and
  • Xiaoyong Sun

With the rapid development of information technology and the increasing application of UAV in various fields, the security problems of unmanned aerial vehicle (UAV) communication network have become increasingly prominent. It has become an important...

  • Article
  • Open Access
13 Citations
3,705 Views
17 Pages

A Security-Enhanced Image Communication Scheme Using Cellular Neural Network

  • Heping Wen,
  • Jiajun Xu,
  • Yunlong Liao,
  • Ruiting Chen,
  • Danze Shen,
  • Lifei Wen,
  • Yulin Shi,
  • Qin Lin,
  • Zhonghao Liang and
  • Chongfu Zhang
  • + 5 authors

31 July 2021

In the current network and big data environment, the secure transmission of digital images is facing huge challenges. The use of some methodologies in artificial intelligence to enhance its security is extremely cutting-edge and also a development tr...

  • Feature Paper
  • Article
  • Open Access
16 Citations
5,030 Views
13 Pages

Challenges in Physical Layer Security for Visible Light Communication Systems

  • Sunghwan Cho,
  • Gaojie Chen,
  • Justin P. Coon and
  • Pei Xiao

20 January 2022

This article highlights challenges associated with securing visible light communication (VLC) systems by using physical layer security (PLS) techniques. Motivated by the achievements in PLS studies for radio frequency (RF) communication, many PLS tec...

  • Article
  • Open Access
3 Citations
3,317 Views
31 Pages

1 July 2022

Distributed machine learning is primarily motivated by the promise of increased computation power for accelerating training and mitigating privacy concerns. Unlike machine learning on a single device, distributed machine learning requires collaborati...

  • Review
  • Open Access
56 Citations
11,784 Views
33 Pages

Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions

  • Syed Hussain Ali Kazmi,
  • Rosilah Hassan,
  • Faizan Qamar,
  • Kashif Nisar and
  • Ag Asri Ag Ibrahim

25 May 2023

Challenges faced in network security have significantly steered the deployment timeline of Fifth Generation (5G) communication at a global level; therefore, research in Sixth Generation (6G) security analysis is profoundly necessitated. The prerogati...

  • Article
  • Open Access
3,017 Views
13 Pages

Given the vulnerability of deep neural network to adversarial attacks, the application of deep learning in the wireless physical layer arouses comprehensive security concerns. In this paper, we consider an autoencoder-based communication system with...

  • Review
  • Open Access
1 Citations
2,230 Views
35 Pages

18 August 2025

Integration of sensing, communication, computing, and intelligence (ISCCI) represents a pivotal advancement in B5G and 6G technologies, offering transformative potential for the Internet of Vehicles (IoV). As IoV systems become increasingly integral...

  • Article
  • Open Access
1 Citations
1,675 Views
16 Pages

10 November 2023

As one of the main candidates for future civil aviation communications systems, the L-band digital aeronautical communication system (L-DACS) is expected to achieve secure and reliable transmission. Due to the broadcasting nature of air–ground...

  • Article
  • Open Access
2 Citations
2,668 Views
18 Pages

Communication and Sensing: Wireless PHY-Layer Threats to Security and Privacy for IoT Systems and Possible Countermeasures

  • Renato Lo Cigno,
  • Francesco Gringoli,
  • Stefania Bartoletti,
  • Marco Cominelli,
  • Lorenzo Ghiro and
  • Samuele Zanini

7 January 2025

Recent advances in signal processing and AI-based inference enable the exploitation of wireless communication signals to collect information on devices, people, actions, and the environment in general, i.e., to perform Integrated Sensing And Communic...

  • Article
  • Open Access
482 Views
25 Pages

16 October 2025

In this paper, we have proposed a two-party authenticated key establishment (AKE), and authenticated key transport protocols based on lattice-based cryptography, aiming to provide security against quantum attacks for secure communication. This protoc...

  • Communication
  • Open Access
18 Citations
5,753 Views
12 Pages

19 February 2021

Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting...

  • Article
  • Open Access
2 Citations
1,741 Views
18 Pages

Security Resource Scheduling Algorithm for Intelligent UAV Communication Network Based on Optimized Subgraph Isomorphism and Link Partition

  • Yanyan Han,
  • Jiangping Yu,
  • Peiliang Zuo,
  • Zhanzhen Wei,
  • Xin Jin,
  • Kaili Dou,
  • Chao Guo and
  • Haitao Xu

The resource scheduling problem of UAV communication networks has always been a hot research issue in the current environment. However, most of the current research focuses on meeting the user’s time cost requirements and rarely considers the u...

  • Article
  • Open Access
3 Citations
1,650 Views
14 Pages

Enhancing Security in Visible Light Communication: A Tabu-Search-Based Method for Transmitter Selection

  • Ge Shi,
  • Wei Cheng,
  • Xiang Gao,
  • Fupeng Wei,
  • Heng Zhang and
  • Qingzheng Wang

16 March 2024

In this paper, we explore the secrecy performance of a visible light communication (VLC) system consisting of distributed light-emitting diodes (LEDs) and multiple users (UEs) randomly positioned within an indoor environment while considering the pre...

  • Article
  • Open Access
4 Citations
3,444 Views
25 Pages

9 November 2020

The Internet of Things uses low-power wireless communication for wireless connectivity and efficient energy. Low-power wireless communication is applied to IoT for wireless connection and efficient energy consumption in various areas such as wearable...

  • Review
  • Open Access
11 Citations
5,152 Views
29 Pages

20 February 2024

The spectrum of Internet of Things (IoT) applications is vast. It serves in various domains such as smart homes, intelligent buildings, health care, emergency response, and many more, reflecting the exponential market penetration of the IoT. Various...

  • Article
  • Open Access
14 Citations
2,965 Views
15 Pages

In the realm of smart communication systems, where the ubiquity of 5G/6G networks and IoT applications demands robust data confidentiality, the cryptographic integrity of block and stream cipher mechanisms plays a pivotal role. This paper focuses on...

  • Article
  • Open Access
1 Citations
1,059 Views
27 Pages

20 May 2025

With the widespread adoption of wireless communication technologies in modern high-speed rail systems, the Train-to-Ground (T2G) communication system for Electric/Diesel Multiple Units (EMU/DMU) has become essential for train operation monitoring and...

  • Article
  • Open Access
1 Citations
1,172 Views
22 Pages

Knowledge Sharing in Security-Sensitive Communities

  • Yonit Rusho,
  • Daphne Ruth Raban,
  • David Simantov and
  • Gilad Ravid

26 March 2025

Collective intelligence inherently relies on knowledge sharing. In security-sensitive organizations, tension arises between the need to develop collective knowledge and organizational culture, which requires secrecy. Drawing on the effects of trust o...

  • Article
  • Open Access
4 Citations
1,317 Views
17 Pages

Sensing-Assisted Secure Communications over Correlated Rayleigh Fading Channels

  • Martin Mittelbach,
  • Rafael F. Schaefer,
  • Matthieu Bloch,
  • Aylin Yener and
  • Onur Günlü

21 February 2025

We consider a secure integrated sensing and communication (ISAC) scenario, where a signal is transmitted through a state-dependent wiretap channel with one legitimate receiver with which the transmitter communicates and one honest-but-curious target...

  • Article
  • Open Access
11 Citations
2,393 Views
7 Pages

Experimental Demonstration of Secure Relay in Quantum Secure Direct Communication Network

  • Min Wang,
  • Wei Zhang,
  • Jianxing Guo,
  • Xiaotian Song and
  • Guilu Long

16 November 2023

Quantum secure direct communication (QSDC) offers a practical way to realize a quantum network which can transmit information securely and reliably. Practical quantum networks are hindered by the unavailability of quantum relays. To overcome this lim...

  • Review
  • Open Access
30 Citations
6,857 Views
33 Pages

Vehicular Platoon Communication: Architecture, Security Threats and Open Challenges

  • Sean Joe Taylor,
  • Farhan Ahmad,
  • Hoang Nga Nguyen and
  • Siraj Ahmed Shaikh

23 December 2022

The emerging technology that is vehicular platooning is an exciting technology. It promises to save space on congested roadways, improve safety and utilise less fuel for transporting goods, reducing greenhouse gas emissions. The technology has alread...

  • Article
  • Open Access
19 Citations
3,475 Views
26 Pages

A Low Latency Secure Communication Architecture for Microgrid Control

  • Aron Kondoro,
  • Imed Ben Dhaou,
  • Hannu Tenhunen and
  • Nerey Mvungi

1 October 2021

The availability of secure, efficient, and reliable communication systems is critical for the successful deployment and operations of new power systems such as microgrids. These systems provide a platform for implementing intelligent and autonomous a...

  • Article
  • Open Access
4 Citations
3,678 Views
16 Pages

18 April 2022

The aim of this study is to gain a comprehensive understanding of how risk and value factors affect the intention to use South Korean exploitable cyber-security communities based on the value-maximisation perspective of economics. According to the re...

  • Article
  • Open Access
6 Citations
1,906 Views
18 Pages

One-Photon-Interference Quantum Secure Direct Communication

  • Xiang-Jie Li,
  • Min Wang,
  • Xing-Bo Pan,
  • Yun-Rong Zhang and
  • Gui-Lu Long

23 September 2024

Quantum secure direct communication (QSDC) is a quantum communication paradigm that transmits confidential messages directly using quantum states. Measurement-device-independent (MDI) QSDC protocols can eliminate the security loopholes associated wit...

  • Article
  • Open Access
1,527 Views
43 Pages

17 September 2025

Semantic communication (SemCom), as a revolutionary paradigm for next-generation networks, shifts the focus from traditional bit-level transmission to the delivery of meaning and purpose. Grounded in the Data, Information, Knowledge, Wisdom, Purpose...

  • Article
  • Open Access
19 Citations
4,282 Views
32 Pages

28 October 2020

Safety applications based on vehicle-to-everything (V2X) communications can significantly enhance road safety and reduce traffic fatalities. Ensuring the security and privacy of the vehicular network is essential for the widespread adoption of V2X co...

  • Article
  • Open Access
11 Citations
5,485 Views
19 Pages

Blockchain-Enabled Communication Framework for Secure and Trustworthy Internet of Vehicles

  • Manju Biswas,
  • Debashis Das,
  • Sourav Banerjee,
  • Amrit Mukherjee,
  • Waleed AL-Numay,
  • Utpal Biswas and
  • Yudong Zhang

12 June 2023

The emerging field of the Internet of Vehicles (IoV) has garnered significant attention due to its potential to revolutionize transportation and mobility. IoV enables the development of innovative services and applications that can enhance the effici...

  • Article
  • Open Access
4 Citations
4,538 Views
19 Pages

4 November 2023

We provide a practical implementation of a free space optical quantum key distribution (FSO-QKD) system within a vehicle-to-infrastructure (V2I) application developed under the Innovate UK AirQKD project. The FSO-QKD system provides the quantum secur...

  • Review
  • Open Access
153 Citations
19,866 Views
49 Pages

Security in IoMT Communications: A Survey

  • Dimitris Koutras,
  • George Stergiopoulos,
  • Thomas Dasaklis,
  • Panayiotis Kotzanikolaou,
  • Dimitris Glynos and
  • Christos Douligeris

26 August 2020

The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in order to support real-time, remote patient monitoring and treatment. However, the interconnectivity of critical medical devices with other systems in various n...

  • Article
  • Open Access
7 Citations
6,762 Views
37 Pages

18 December 2021

Humans frequently need to construct a huge number of buildings for occupants in large cities to work or live in a highly developed civilization; people who live in the same building or same area are defined as a community. A thief stealing items, a b...

  • Article
  • Open Access
1 Citations
1,398 Views
13 Pages

14 December 2024

As Internet of Things (IoT) technology continues to advance, there is a growing awareness of IoT security within the industry. Quantum communication technology can potentially significantly improve the communication security of IoT devices. Based on...

  • Article
  • Open Access
6 Citations
9,304 Views
15 Pages

Secure Many-to-One Communications in Wireless Sensor Networks

  • Alexandre Viejo,
  • Josep Domingo-Ferrer,
  • Francesc Sebé and
  • Jordi Castellà-Roca

7 July 2009

Wireless Sensor Networks (WSN) are formed by nodes with limited computational and power resources. WSNs are finding an increasing number of applications, both civilian and military, most of which require security for the sensed data being collected b...

  • Article
  • Open Access
2 Citations
1,879 Views
22 Pages

With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and...

  • Review
  • Open Access
105 Citations
26,394 Views
33 Pages

In-Vehicle Communication Cyber Security: Challenges and Solutions

  • Rajkumar Singh Rathore,
  • Chaminda Hewage,
  • Omprakash Kaiwartya and
  • Jaime Lloret

3 September 2022

In-vehicle communication has become an integral part of today’s driving environment considering the growing add-ons of sensor-centric communication and computing devices inside a vehicle for a range of purposes including vehicle monitoring, phy...

  • Article
  • Open Access
10 Citations
4,336 Views
14 Pages

10 October 2020

This paper considers the navigation of a solar-powered unmanned aerial vehicle (UAV) for securing the communication with an intended ground node in the presence of eavesdroppers in urban environments. To complete this task, the UAV needs to not only...

  • Review
  • Open Access
1 Citations
2,962 Views
28 Pages

Unidirectional Communications in Secure IoT Systems—A Survey

  • Lucian Gaina,
  • Cristina Sorina Stangaciu,
  • Daniela Stanescu,
  • Bianca Gusita and
  • Mihai Victor Micea

25 November 2024

The security of Internet of Things (IoT) systems has consistently been a challenge, particularly in the context of critical infrastructure. One particular approach not yet employed in this domain is the unidirectional communication paradigm. This sur...

  • Article
  • Open Access
11 Citations
4,432 Views
16 Pages

An Efficient Framework for Securing the Smart City Communication Networks

  • Faisal Abdulaziz Alfouzan,
  • Kyounggon Kim and
  • Nouf M. Alzahrani

15 April 2022

Recently, smart cities have increasingly been experiencing an evolution to improve the lifestyle of citizens and society. These emerge from the innovation of information and communication technologies (ICT) which are able to create a new economic and...

  • Article
  • Open Access
2 Citations
839 Views
20 Pages

In the era of digital communication, securing sensitive information against increasingly sophisticated cyber threats remains a critical challenge. Chaos synchronization, while promising for secure communication and control systems, faces key limitati...

  • Article
  • Open Access
32 Citations
10,494 Views
12 Pages

Controller–Pilot Data Link Communication Security

  • Andrei Gurtov,
  • Tatiana Polishchuk and
  • Max Wernberg

20 May 2018

The increased utilization of the new types of cockpit communications, including controller–pilot data link communications (CPDLC), puts the airplane at higher risk of hacking or interference than ever before. We review the technological characteristi...

of 145