How Secure are Multicarrier Communication Systems Against Signal Exploitation Attacks?
Alireza NooraiepourKenza HamidoucheWaheed U. BajwaNarayan B. MandayamPublished in: MILCOM (2018)
Keyphrases
- communication systems
- code division multiple access
- unauthorized access
- secure routing
- cryptographic protocols
- stream cipher
- information processing systems
- security protocols
- security mechanisms
- chosen plaintext
- computer systems
- watermarked image
- orthogonal frequency division multiplexing
- security measures
- mc cdma
- high frequency
- countermeasures
- multiple access
- blind equalization
- channel estimation
- access control
- watermarking scheme
- intrusion detection system
- wireless channels
- insider attacks
- frequency domain
- routing protocol
- ad hoc networks
- security analysis
- secret key
- sensitive data
- security requirements
- security issues
- advanced encryption standard
- data analysis