- Wireless Communication Security Techniques
- Distributed Sensor Networks and Detection Algorithms
- Adversarial Robustness in Machine Learning
- Smart Grid Security and Resilience
- Antenna Design and Analysis
- Advanced Wireless Communication Technologies
- Security in Wireless Sensor Networks
- Indoor and Outdoor Localization Technologies
Ruhr University Bochum
2021-2022
In a wireless sensor network, data from various sensors are gathered to estimate the system-state of process system. However, adversaries aim at distorting estimation, for which they may infiltrate or position additional devices in environment. For authentication, receiver can evaluate integrity measurements different jointly with temporal channel each sensor. Therefore, we design security protocol, Kalman filters predict and channel-state values. Then, received is authenticated by...
5G networks enhance the localization performance for both legitimate, yet also misuse by adversarial devices. To distinguish between legitimate and devices, an intelligent reconfigurable surface (IRS) can be configured to only optimize channel when a user equipment (UE) is localizing itself. The comprises direct part new-generation node base (gNB) UE, indirect over IRS. We aim at maximizing mutual information received signal adjusting transmit of gNB IRS configuration alternately. In order...
In a wireless sensor network, data from various sensors are gathered to estimate the system-state of process system. However, adversaries aim at distorting estimate, for which they may infiltrate or position additional devices in environment. To authenticate received values, integrity measurements different can be evaluated jointly with temporal channel each sensor. For this purpose, we design security protocol, Kalman filters used predict and channel-state authenticated by hypothesis test....