Pilot-Attacks Can Enable Positive-Rate Covert Communications of Wireless Hardware Trojans.
Serhat BakirtasMatthieu R. BlochElza ErkipPublished in: CoRR (2024)
Keyphrases
- wireless link
- real time
- low cost
- multiple access
- wireless communication
- communication technologies
- wireless networks
- positive and negative
- hardware and software
- communication networks
- fourth generation
- embedded systems
- countermeasures
- mobile devices
- hardware implementation
- multi hop
- wireless channels
- data acquisition
- watermarking scheme
- mobile ad hoc networks
- wifi
- cellular networks
- security mechanisms
- end to end