no code implementations • 13 Sep 2019 • Andreas Weinand, Raja Sattiraju, Michael Karrenbauer, Hans D. Schotten
PHYSEC based message authentication can, as an alternative to conventional security schemes, be applied within \gls{urllc} scenarios in order to meet the requirement of secure user data transmissions in the sense of authenticity and integrity.
no code implementations • 14 Nov 2017 • Andreas Weinand, Michael Karrenbauer, Raja Sattiraju, Hans D. Schotten
Beside unfulfilled reliability requirements, the availability of a system can further be reduced, if it is under attack in the sense of violation of information security goals such as data authenticity or integrity.
Networking and Internet Architecture Signal Processing