Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Munster Technological University

2.2 ELECTRICAL, ELECTRONIC, INFORMATION ENGINEERING

Discipline

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Differential Privacy Techniques For Cyber Physical Systems: A Survey, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen Mar 2020

Differential Privacy Techniques For Cyber Physical Systems: A Survey, Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen

Publications

Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT).With the provision of CPSs, the security and privacy threats associated to these systems are also increasing. Passive attacks are being used by intruders to get access to private information of CPSs. In order to make CPSs data more secure, certain privacy preservation strategies such as encryption, and k-anonymity have been presented in the past. However, with the advances in CPSs architecture, these techniques also need certain modifications. Meanwhile, differential privacy emerged as an efficient technique to protect CPSs …


Mac Protocols For Terahertz Communication: A Comprehensive Survey, Saim Ghafoor, Noureddine Boujnah, Mubashir Husain Rehmani, Alan Davy Jan 2020

Mac Protocols For Terahertz Communication: A Comprehensive Survey, Saim Ghafoor, Noureddine Boujnah, Mubashir Husain Rehmani, Alan Davy

Publications

Terahertz communication is emerging as a future technology to support Terabits per second link with highlighting features as high throughput and negligible latency. However, the unique features of the Terahertz band such as high path loss, scattering, and reflection pose new challenges and results in short communication distance. The antenna directionality, in turn, is required to enhance the communication distance and to overcome the high path loss. However, these features in combine negate the use of traditional medium access protocols (MAC). Therefore, novel MAC protocol designs are required to fully exploit their potential benefits including efficient channel access, control message …