Loading [MathJax]/extensions/MathMenu.js
Kevin T. Kornegay - IEEE Xplore Author Profile

Showing 1-25 of 110 results

Filter Results

Show

Results

The performance of 5G-enabled Mission Critical Push-to-Talk (MCPTT) services is examined in this study to improve a city’s smart security infrastructure. The investigation compares the effects of 5G, 4G, and conventional Land Mobile Radio (LMR) systems while assessing the blocking likelihood across several communication channels. The benefit of 5G in sustaining dependable communication over greate...Show More
Traditional security mechanisms and architectures are falling short, impacting both organizations and end users alike. The rapid growth and variety of Internet of Things (IoT) devices have significantly expanded the attack surface and increased network vulnerabilities. In recent years, Zero Trust (ZT) has gained traction in its attempt to solve the inherent flaws of the traditional perimeter-centr...Show More
This article presents the design implementation, analysis and performance of a four-stage single ended power amplifier (PA) developed on a 40 nm gallium nitride on silicon carbide (GaN/SiC) technology. The circuit targets the upper F-Band, and it operates from 125 GHz to 130 GHz. At 130 GHz, the amplifier aims to have a small signal power gain $G$p of 18 dB, peak power-added efficiency (PAE) of 10...Show More
This study examines the performance of smart security systems with 5G capabilities in detail, considering Adama City’s development strategy for smart cities. Installing considerable cabling may become logistically challenging, especially in large or dynamic spaces. Furthermore, connected systems may experience latency problems that impair their capacity to monitor in real time. Using empirical dat...Show More
With the availability of Internet of Things (IoT) devices offering varied services, smart home environments have seen widespread adoption in the last two decades. Protecting privacy in these environments becomes an important problem because IoT devices may collect information about the home’s occupants without their knowledge or consent. Furthermore, a large number of devices in the home, each col...Show More
Industrial Control Systems (ICS) are critical in ensuring the efficient operation of various industrial processes. However, their increasing connectivity and integration with modern technologies have exposed them to a higher risk of cyber threats and intrusions. This paper examines potential threats that adversaries pose to BACnet’s Master-Slave/Token-Passing (MS/TP) networks. By exploiting vulner...Show More
As IoT devices become more common, security must be a priority. Many devices lack built-in protection due to design oversights and resource constraints. These limitations make them vulnerable to hacking and unable to support sophisticated security software or automatic updates. Attackers exploit these weaknesses to access and manipulate customer settings despite some devices using SSL/TLS protocol...Show More
Internet of Things (IoT) devices left behind when a home is sold create security and privacy concerns for both prior and new residents. We envision a specialized “building inspector for IoT” to help securely facilitate transfer of the home.Show More
With the increase in data transmissions and network traffic over the years, there has been an increase in concerns about protecting network data and information from snooping. With this concern, encryptions are incorporated into network protocols. From wireless protocols to web and phone applications, systems that handle the going and coming of data on the network have applied different kinds of e...Show More
Despite long-contested viability, numerous applications still rely upon Advance Encryption Standard (AES) in Counter mode (AES-CTR). Research supports that the vulnerabilities associated with CTR from a mathematical perspective, mainly forgery attempts, stem from misusing the nonce. When paired with cryptographic algorithms, assuming no nonce misuse increases the complexity of unraveling CTR. This...Show More
Project Connected Home over IP, known as Matter, a unifying standard for the smart home, will begin formal device certification in late 2022. The standard will prioritize connectivity using short-range wireless communication protocols such as Wi-Fi, Thread, and Ethernet. The standard will also include emerging technologies such as Blockchain for device certification and security. In this paper, we...Show More
Researchers are looking into solutions to support the enormous demand for wireless communication, which has been exponentially increasing along with the growth of technology. The sixth generation (6G) Network emerged as the leading solution for satisfying the requirements placed on the telecommunications system. 6G technology mainly depends on various machine learning and artificial intelligence t...Show More
One of the grand challenges recently thrust on engineering education is providing active, experiential learning that can flex with significant global events such as pandemics and meet the needs of individual students. The COVID pandemic is a prominent driving force for change, but beyond that, meeting the needs of students with physical, economic, or temporal barriers, such as with professional le...Show More
Industrial Control Systems (ICS) collect information from various sensors through routine processes, using the data collected to control the physical environments. However, from the industrial control perspective, the reliability in the communication between sensors and edge node devices is in question. This paper looks at the specific threats of physical layer attacks on BACnet systems and how an...Show More
Current generation mobile communications require high-quality services. Adopting multiple access (MA) and multi-carrier waveforms potentially enhances the quality of services offered to end-users. However, in the majority of literature, the integration of multi-carrier and multiple-access approaches have not been extensively examined. One possible solution is to review multiple access and multi-ca...Show More
Massive MIMO and mmWave communication are the technologies for achieving 5G design goals. Fortunately, these two technologies share a symbiotic integration. As a result, amalgamating mmWave communications with massive MIMO forms,mmWave-massive MIMO,” which significantly improves spectral and energy efficiency. It also achieves high multiplexing gains and increases mobile network capacity. However,...Show More
Internet of Things (IoT) has infiltrated the digital realm, and critical efforts are being made to create robust security for these technologies. However, with increasingly sophisticated attacks, it is essential to understand IoT device security in depth. We orchestrated Denial of Service (DoS) attacks for four different IoT devices through network flooding to understand the device vulnerabilities...Show More
Researchers have shown via simulation and early flight tests the feasibility and safety benefit of adding autonomy to the concept of unmanned aircraft system (UAS) Traffic Management (UTM), which is the Federal Aviation Administration’s (FAA) vision for air traffic management below 400 feet. Such simulations are a complex interaction between UAS, UAS operators, and the UTM system. Autonomy in this...Show More
Technology is evolving exponentially, and researchers are seeking solutions to answer questions related to the benefits of using advanced IoT cloud computing platforms. There is a tremendous amount of research activity regarding cyberattacks on Internet of Things (IoT) devices. IoT ecosystems consist of physical objects or devices that interact with the environment, extract data, and communicate w...Show More
Our premise is that assuring autonomy has operational and security components and that artificial intelligence (AI) based methods are appropriate for this task; however, making these AI techniques “Explainable” can be non-trivial. Further, our position is that a reasonable solution to this problem would require a monitor (preferably at the ground station) to access the drone's operational autonomy...Show More
Advances in artificial intelligence, machine learning, and robotics have profoundly impacted the field of autonomous navigation and driving. However, sensor spoofing attacks can compromise critical components and the control mechanisms of mobile robots. Therefore, understanding vulnerabilities in autonomous driving and developing countermeasures remains imperative for the safety of unmanned vehicl...Show More
This paper proposes a novel energy efficient beamforming and DOA estimation scheme called RLS-MUSIC algorithm. First, we study different adaptive beamforming algorithms and receive signal Degree-of-Arrival (DOA) estimation techniques for wireless communication network application in reference to their effect on energy efficiency. Taking linear array smart antenna elements geometry, which is mostly...Show More
Smart antenna consist of multiple antenna elements at the transmitting and/or receiving side of the communication link, whose signals are processed adaptively in order to exploit the spatial dimension of the wireless channel. Depending on the signal process at the transmitter, receiver, or both ends of the communication link, the smart antenna technique can increase the capacity of the wireless ne...Show More
The Internet of Things (IoT) is growing with the advancement of technology. Many vendors are creating IoT devices to leverage the quality of life of consumers. These devices include smart grids, smart homes, smart health care systems, smart transportation, and many other applications. IoT devices interact with the environment and each other using sensors and actuators. However, the widespread prol...Show More
With the rise of disruptive artificial intelligence (AI) technology, assuring autonomous systems is of the utmost importance. The drive to spread autonomous vehicles to all whether military or the commercial space is makes autonomous navigation a must for assurance. In this paper, we introduce the concept of using explainable AI to assure the operational autonomy of a vehicle while monitoring the ...Show More