Hardware impaired ambient backscatter NOMA systems: Reliability and security

X Li, M Zhao, M Zeng, S Mumtaz… - … on Communications, 2021 - ieeexplore.ieee.org
… Additionally, the secrecy rate was studied under the traditional backscatter communications
security of the ambient backscatter communication systems, an optimal tag selection scheme

A secure and reliable device access control scheme for IoT based sensor cloud systems

SA Chaudhry, K Yahya, F Al-Turjman, MH Yang - Ieee Access, 2020 - ieeexplore.ieee.org
… concerns, the reliable device to device direct communication … the reliability through secure
communication among two IoT … are selected for computing the comparative communication

Reconfigurable intelligent surface-assisted secure mobile edge computing networks

S Mao, L Liu, N Zhang, M Dong, J Zhao… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
secure offloading method can achieve almost the same computation efficiency as compared
with the offloading scheme … the robust secure offloading scheme considering imperfect …

A fast chaotic image encryption scheme with simultaneous permutation-diffusion operation

L Liu, Y Lei, D Wang - IEEE access, 2020 - ieeexplore.ieee.org
… ABSTRACT In this paper, a secure and fast chaotic image encryption scheme with … the
attacker selected some special images to obtain the permutation and diffusion rules, our …

Joint security and train control design in blockchain-empowered CBTC system

L Zhu, H Liang, H Wang, B Ning… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
communication between train control equipment. We aim to improve CBTC system security
and minimize the security scheme … , we study issues concerning the block producer selection

Immunity of Signals Transmission Using Secured Unequal Error Protection Scheme with Various Packet Format

H Kasban, S Nassar, MAMM El-Bendary - International Conference on …, 2022 - Springer
Selection Scheduling (BSS) scheme which can … scheme is presented. Performance evaluation
of a hybrid prefixing strategy implemented multicarrier cm-Wave wireless communication

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… We categorize the existing PLA schemes into two categories: passive and active schemes. …
For ensuring security, a PLA scheme should make the inability of the adversary to mount …

On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system

P Bagga, AK Das, M Wazid… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
… show that the proposed scheme is secure against several … selected, all members (vehicles)
in a cluster authenticate each other and establish secret keys for their secure communications

Repchain: A reputation-based secure, fast, and high incentive blockchain system via sharding

C Huang, Z Wang, H Chen, Q Hu… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
… Moreover, we propose a reputation-based sharding and leader selection scheme. To analyze
the security of RepChain, we propose a recursive formula to calculate the epoch security

A blockchain-based secure key management scheme with trustworthiness in DWSNs

Y Tian, Z Wang, J Xiong, J Ma - IEEE Transactions on Industrial …, 2020 - ieeexplore.ieee.org
… In addition, we design a secure cluster formation algorithm and a secure node movement …
the security analysis and ample simulations. The results indicate that that the BC-EKM scheme