2019 6th International Conference on Signal Processing and Integrated Networks (SPIN) 2019
DOI: 10.1109/spin.2019.8711682
|View full text |Cite
|
Sign up to set email alerts
|

LoRa PHY Range Tests and Software Decoding - Physical Layer Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…An improvement to this protocol, called Zerocash, instead implemented a "zeroknowledge non-interactive arguments of knowledge" (zk-SNARK). This validation method improves the speed and cost of transactions, which can remain completely anonymous since balances cannot be deduced from the blockchain [30]. Since that research into shielded transactions with zk-SNARK was released, an increasing number of altcoins have implemented it within their frameworks.…”
Section: Countermeasures To Blockchain Analysismentioning
confidence: 99%
“…An improvement to this protocol, called Zerocash, instead implemented a "zeroknowledge non-interactive arguments of knowledge" (zk-SNARK). This validation method improves the speed and cost of transactions, which can remain completely anonymous since balances cannot be deduced from the blockchain [30]. Since that research into shielded transactions with zk-SNARK was released, an increasing number of altcoins have implemented it within their frameworks.…”
Section: Countermeasures To Blockchain Analysismentioning
confidence: 99%
“…Although there are already works on FD jamming for secrecy purposes [ 18 , 19 ], as far as we are aware there is no practical proof-of-concept with a hardware/software implementation (the authors would like to disclose that this work has been presented, only in part, at the international conference CSNDSP2020 [ 20 ]). Rather, existing works with implementations of physical-layer security schemes tend to focus on secret-key agreement strategies [ 21 , 22 ], deriving security from signaling efforts such as beamforming, channel estimation and spread spectrum [ 23 , 24 , 25 ], or using the physical layer to authenticate users through radio signal analysis [ 26 , 27 , 28 ].…”
Section: Introductionmentioning
confidence: 99%