Demonstrating and Mitigating the Risk of an FEC-Based Hardware Trojan in Wireless Networks.
Kiruba Sankaran SubramaniAngelos AntonopoulosAhmed Attia AbotablAria NosratiniaYiorgos MakrisPublished in: IEEE Trans. Inf. Forensics Secur. (2019)
Keyphrases
- wireless networks
- risk management
- video delivery
- wireless communication
- cross layer optimization
- ad hoc networks
- base station
- mobile computing
- low cost
- link layer
- low bandwidth
- real time
- network access
- wireless ad hoc networks
- cellular networks
- wired networks
- wireless technologies
- wireless channels
- multimedia services
- cross layer
- packet loss
- computer systems
- mobile networks
- network coding
- scalable video
- multiple description coding
- rate adaptation