• Publications
  • Influence
Using Spectral Fingerprints to Improve Wireless Network Security
tl;dr
The proliferation of affordable RF communication devices has given every individual the capability to communicate voice and/or data worldwide. Expand
  • 115
  • 18
Security analysis of the ADS-B implementation in the next generation air transportation system
tl;dr
This paper analyzes the security vulnerabilities associated with the ADS-B implementation. Expand
  • 153
  • 9
Evolution of the air interface of cellular communications systems toward 4G realization
tl;dr
Coding, modulation, and multiple access developments within the evolutional framework of cellular communication systems which spans early first generation (1G) to future fourth generation (4G) systems. Expand
  • 70
  • 8
Radio frequency fingerprinting commercial communication devices to enhance electronic security
tl;dr
There is a current shift toward protecting against unauthorised network access at the open systems physical layer by exploiting radio frequency characteristics that are difficult to mimic. Expand
  • 64
  • 6
Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection
tl;dr
Three new algorithms recommended by the National Institute of Standards and Technology (NIST) for format-preserving encryption could potentially support the encryption of legacy protocols in critical infrastructure assets. Expand
  • 13
  • 5
A general analytic framework for spectrally modulated, spectrally encoded signals
tl;dr
This paper presents a general analytic framework which mathematically incorporates the waveform adaptivity and diversity found in spectrally modulated, spectrALLY encoded (SMSE) signals. Expand
  • 32
  • 4
Enhancing the security of aircraft surveillance in the next generation air traffic control system
tl;dr
This paper evaluates the limitations of the legacy systems currently used in air traffic control and explores the feasibility of employing format-preserving encryption, specifically the FFX algorithm, in the ADS-B environment. Expand
  • 32
  • 3
Detectability models for multiple access low-probability-of-intercept networks
tl;dr
In this paper, two multiple access LPI network detectability models, with their corresponding performance metrics, were developed. Expand
  • 14
  • 3
How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum
tl;dr
In this article, we provide a brief history of the Cyber Defense Exercise (CDX), describe Air Force Institute of Technology's participation in it, and explain how the experience shaped the information-assurance curriculum and course format at AFIT. Expand
  • 37
  • 2
Waveform design and analysis of frequency hopping LPI networks
The concept of a multiple access low-probability-of-intercept (LPI) network has generated considerable interest in the past few years, due to increased demands for highly connected, yet covert,Expand
  • 21
  • 2