Wireless Communication: Applications Security and Reliability—Present and Future
Abstract
:1. Introduction
2. The Present Issue
3. Future
Acknowledgments
Conflicts of Interest
References
- Cirjulina, D.; Babajans, R.; Capligins, F.; Kolosovs, D.; Litvinenko, A. Experimental Study on Colpitts Chaotic Oscillator-Based Communication System Application for the Internet of Things. Appl. Sci. 2024, 14, 1180. [Google Scholar] [CrossRef]
- Roh, S.; Nguyen, T.D.; Lee, J.S. Applications of Nanomaterials in RFID Wireless Sensor Components. Appl. Sci. 2024, 14, 1216. [Google Scholar] [CrossRef]
- Afreen, H.; Kashif, M.; Shaheen, Q.; Alfaifi, Y.H.; Ayaz, M. IoT-Based Smart Surveillance System for High-Security Areas. Appl. Sci. 2023, 13, 8936. [Google Scholar] [CrossRef]
- Almazroi, A.A.; Liaqat, M.; Ali, R.L.; Gani, A. SLMAS: A Secure and Light Weight Mutual Authentication Scheme for the Smart Wheelchair. Appl. Sci. 2023, 13, 6564. [Google Scholar] [CrossRef]
- Martin, R.; Lopez, B.; Vidal, I.; Valera, F.; Nogales, B. Service for Deploying Digital Twins of QKD Networks. Appl. Sci. 2024, 14, 1018. [Google Scholar] [CrossRef]
- Razek, A. Assessment and Categorization of Biological Effects and Atypical Symptoms Owing to Exposure to RF Fields from Wireless Energy Devices. Appl. Sci. 2023, 13, 1265. [Google Scholar] [CrossRef]
- Huang, Y.; Martinez, J.-F.; Diaz, V.H.; Sendra, J. A Novel Topology Control Approach to Maintain the Node Degree in Dynamic Wireless Sensor Networks. Sensors 2014, 14, 4672–4688. [Google Scholar] [CrossRef] [PubMed]
- Chrysikos, T.; Gourna, S.; Skouroliakou, A. RF Coverage Design for the Implementation of a Broadband Monitoring Service in the Context of 5G-Enabled Smart Cities. Information 2023, 14, 156. [Google Scholar] [CrossRef]
- Razaque, A.; Elleithy, K.M. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks. Sensors 2014, 14, 5074–5117. [Google Scholar] [CrossRef]
- Anh Le, D.T.; Nguyen, H.; Jang, J.M. An Experimental Demonstration of 2D-Multiple-Input-Multiple- Output-Based Deep Learning for Optical Camera Communication. Appl. Sci. 2024, 14, 1003. [Google Scholar] [CrossRef]
- Alexan, W.; ElBeltagy, M.; Aboshousha, A. RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System. Symmetry 2022, 14, 443. [Google Scholar] [CrossRef]
- Song, I.; Jeon, S.; Kim, D.; Lee, M.G.; Seo, J.T. GENICS: A Framework for Generating Attack Scenarios for Cybersecurity Exercises on Industrial Control Systems. Appl. Sci. 2024, 14, 768. [Google Scholar] [CrossRef]
- Ali, O.; Nguyen, T.-L.; Mohammed, O.A. Assessment of Cyber-Physical Inverter-Based Microgrid Control Performance under Communication Delay and Cyber-Attacks. Appl. Sci. 2024, 14, 997. [Google Scholar] [CrossRef]
- Lopez-Garcia, D.A.; Torreglosa, J.P.; Vera, D.; Sanchez-Raya, M. Binary-Tree-Fed Mixnet: An Efficient Symmetric Encryption Solution. Appl. Sci. 2024, 14, 966. [Google Scholar] [CrossRef]
- Mohsenabad, H.N.; Tut, M.A. Optimizing Cybersecurity Attack Detection in Computer Networks: A Comparative Analysis of Bio-Inspired Optimization Algorithms Using the CSE-CIC-IDS 2018 Dataset. Appl. Sci. 2024, 14, 1044. [Google Scholar] [CrossRef]
- Choi, D.H.; Lee, E.; Yook, J.G. Reconstruction of Video Information Through Leakaged Electromagnetic Waves 523 from Two VDUs Using a Narrow Band-Pass Filter. IEEE Access 2022, 10, 40307–40315. [Google Scholar] [CrossRef]
- Aydın, H. TEMPEST Attacks and Cybersecurity. Int. J. Eng. Technol. 2019, 5, 552. [Google Scholar]
- Zhang, N.; Lu, Y.; Cui, Q.; Wang, Y. Investigation of unintentional video emanations from a VGA connector in the desktop Computers. IEEE Trans. Electromagn. Compat. 2017, 59, 1826–1834. [Google Scholar] [CrossRef]
- Przybysz, A.; Grzesiak, K.; Kubiak, I. Electromagnetic Safety of Remote Communication Devices—Videoconference. Symmetry 2021, 13, 323. [Google Scholar] [CrossRef]
- Han, Y.; Liang, J.; Lin, Y. Joint Deployment Optimization of Parallelized SFCs and BVNFs in Multi-Access Edge Computing. Appl. Sci. 2023, 13, 7261. [Google Scholar] [CrossRef]
- Zhou, R.; Zhang, X.; Song, D.; Qin, K.; Xu, L. Topology Duration Optimization for UAV Swarm Network under the System Performance Constraint. Appl. Sci. 2023, 13, 5602. [Google Scholar] [CrossRef]
- Ali, M.; Jehangiri, A.I.; Alramli, O.I.; Ahmad, Z.; Ghoniem, R.M.; Ala’anzy, M.A.; Saleem, R. Performance and Scalability Analysis of SDN-Based Large-Scale Wi-Fi Networks. Appl. Sci. 2023, 13, 4170. [Google Scholar] [CrossRef]
- Sánchez-Patiño, N.; Gallegos-Garcia, G.; Rivero-Angeles, M.E. Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions. Appl. Sci. 2023, 13, 4625. [Google Scholar] [CrossRef]
- Piao, J.; Jin, S.; Seo, D.H.; Woo, S.; Chung, J.G. MAC-Based Compression Ratio Improvement for CAN Security. Appl. Sci. 2023, 13, 2654. [Google Scholar] [CrossRef]
- Chen, Y.; Kokar, M.M.; Moskal, J.; Chowdhury, K.R. Metrics-Based Comparison of OWL and XML for Representing and Querying Cognitive Radio Capabilities. Appl. Sci. 2022, 12, 11946. [Google Scholar] [CrossRef]
- Alatawi, A.S. A Testbed for Investigating the Effect of Salinity and Turbidity in the Red Sea on White-LED-Based Underwater Wireless Communication. Appl. Sci. 2022, 12, 9266. [Google Scholar] [CrossRef]
- Choi, J.; Park, D.; Kim, S. Seungyoung Ahn, Implementation of a Noise-Shaped Signaling System through Software-Defined Radio. Appl. Sci. 2022, 12, 641. [Google Scholar] [CrossRef]
- Liu, Y.; Zhang, J.; Zhang, D. Saddle Point Approximation of Mutual Information for Finite-Alphabet Inputs over Doubly Correlated MIMO Rayleigh Fading Channels. Appl. Sci. 2021, 11, 4700. [Google Scholar] [CrossRef]
- Kaniewski, P.; Romanik, J.; Golan, E.; Zubel, K. Spectrum Awareness for Cognitive Radios Supported by Radio Environment Maps: Zonal Approach. Appl. Sci. 2021, 11, 2910. [Google Scholar] [CrossRef]
- Wang, H.; Li, M.; Wang, C. A Universal Low-Complexity Demapping Algorithm for Non-Uniform Constellations. Appl. Sci. 2020, 10, 8572. [Google Scholar] [CrossRef]
- Cho, J. Detection of Misconfigured BYOD Devices in Wi-Fi Networks. Appl. Sci. 2020, 10, 7203. [Google Scholar] [CrossRef]
- Na, Y.-Y.; Lee, W.-S.; Paek, M.-J.; Song, H.-K.; Hwang, D.; You, Y.-H. Adaptive Relay Selection Scheme by Using Compound Channel. Appl. Sci. 2020, 10, 5614. [Google Scholar] [CrossRef]
- Kubiak, I.; Przybysz, A. Pseudo-Coloring as an Effective Tool to Improve the Readability of Images Obtained in an Electromagnetic Infiltration Process. Appl. Sci. 2023, 13, 9496. [Google Scholar] [CrossRef]
- Kubiak, I.; Przybysz, A.; Grzesiak, K. Number of Lines of Image Reconstructed from a Revealing Emission Signal as an Important Parameter of Rasterization and Coherent Summation Processes. Appl. Sci. 2023, 13, 447. [Google Scholar] [CrossRef]
- Kubiak, I.; Przybysz, A. Measurements and Correctness Criteria for Determining the Line Length of the Data Image Obtained in the Process of Electromagnetic Infiltration. Appl. Sci. 2022, 12, 10384. [Google Scholar] [CrossRef]
- Kubiak, I.; Przybysz, A. Fourier and Chirp-Z Transforms in the Estimation Values Process of Horizontal and Vertical Synchronization Frequencies of Graphic Displays. Appl. Sci. 2022, 12, 5281. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kubiak, I. Wireless Communication: Applications Security and Reliability—Present and Future. Appl. Sci. 2024, 14, 3865. https://doi.org/10.3390/app14093865
Kubiak I. Wireless Communication: Applications Security and Reliability—Present and Future. Applied Sciences. 2024; 14(9):3865. https://doi.org/10.3390/app14093865
Chicago/Turabian StyleKubiak, Ireneusz. 2024. "Wireless Communication: Applications Security and Reliability—Present and Future" Applied Sciences 14, no. 9: 3865. https://doi.org/10.3390/app14093865
APA StyleKubiak, I. (2024). Wireless Communication: Applications Security and Reliability—Present and Future. Applied Sciences, 14(9), 3865. https://doi.org/10.3390/app14093865