Skip to content
Home » Blogposts » Page 4

Blogposts

Semantics-Aware Active Fault Detection in Status Updating Systems

Monitoring large IoT networks is challenging, especially when devices operate in remote environments and faults cannot be easily observed. This paper introduces a semantics-aware active fault detection approach, where a monitor intelligently decides when to probe a remote sensor to… Read More »Semantics-Aware Active Fault Detection in Status Updating Systems

Decentralized LLM Inference over Edge Networks with Energy Harvesting

As large language models continue to grow, running them efficiently on small edge devices remains one of AI’s biggest challenges. This paper explores how LLM inference can be decentralized across a network of energy-harvesting devices each powered by intermittent renewable… Read More »Decentralized LLM Inference over Edge Networks with Energy Harvesting

A Latent Space Metric for Enhancing Prediction Confidence in Earth Observation Data

This paper proposes a new method for estimating the reliability of machine learning predictions applied to Earth observation (EO) and health-related datasets, with a focus on forecasting mosquito abundance (MA). The authors develop a Variational Autoencoder (VAE)-based confidence metric that… Read More »A Latent Space Metric for Enhancing Prediction Confidence in Earth Observation Data

Detecting 5G Signal Jammers Using Spectrograms with Supervised and Unsupervised Learning

This paper proposes a lightweight wireless intrusion detection method that identifies 5G jamming attacks using spectrograms derived directly from received IQ samples. Instead of relying on higher-layer metrics like PER or SINR which can fluctuate naturally and often fail to… Read More »Detecting 5G Signal Jammers Using Spectrograms with Supervised and Unsupervised Learning

Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones

In this paper, the authors propose a physical-layer challenge–response authentication (CR-PLA) protocol designed specifically for drone communication. Instead of relying on cryptographic keys, the receiver drone (Bob) authenticates the sender by exploiting location-dependent wireless channel attenuation, influenced by path loss… Read More »Energy-Based Optimization of Physical-Layer Challenge-Response Authentication with Drones

Physical-Layer Challenge-Response Authentication with IRS and Single-Antenna Devices

In this paper, a challenge–response physical-layer authentication (CR-PLA) scheme is proposed in which the receiver uses an Intelligent Reflecting Surface (IRS) to validate the identity of a single-antenna transmitter. The method operates by randomly selecting IRS phase configurations and checking… Read More »Physical-Layer Challenge-Response Authentication with IRS and Single-Antenna Devices

Divergence-Minimizing Attack Against Challenge-Response Authentication with IRSs

This paper analyzes a new attack strategy targeting challenge–response physical layer authentication (CR-PLA) systems that rely on intelligent reflecting surfaces (IRSs). The authors extend prior KL-divergence–based bounds for conventional PLA to the CR-PLA setting, where Bob randomizes the IRS phase… Read More »Divergence-Minimizing Attack Against Challenge-Response Authentication with IRSs

Physical Layer Authentication Using Information Reconciliation

This paper investigates a physical layer authentication (PLA) scheme designed to overcome the limitations of traditional cryptographic approaches in large-scale and heterogeneous wireless networks, particularly for resource-constrained IoT devices. The proposed method introduces a reconciliation-based approach that leverages distributed source coding (Slepian-Wolf) with polar… Read More »Physical Layer Authentication Using Information Reconciliation

Secret Key Generation Rates for Line of Sight Multipath Channels in the Presence of Eavesdroppers

In this paper, the feasibility of implementing a lightweight key distribution scheme using physical layer security for secret key generation (SKG) is explored. Specifically, we focus on examining SKG with the received signal strength (RSS) serving as the primary source… Read More »Secret Key Generation Rates for Line of Sight Multipath Channels in the Presence of Eavesdroppers