T Lv, Y Yin, Y Lu, S Yang, E Liu… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
… a typical cooperative relaynetwork consisting … detecting malicious attacks in a two-hop AF relaynetwork in the presence of an unreliable CSI. In particular, we have proposed a detection …
… To detect such an attack, we present hybrid intrusion detection systems that rely on the monitoring of uplink and downlink packets transmitted between IoT devices and the relay. …
… system performance severely if the relay misbehaves. Most existing work of … relays. With this regard, we propose a two-tier approach to detectmisbehavingrelay in quasi-static relay …
S Dehnie, N Memon - MILCOM 2008-2008 IEEE Military …, 2008 - ieeexplore.ieee.org
… In [10] a statistical technique is proposed to detect selfish behavior in IEEE 802.11 DCF, … to detectmisbehaving nodes in cooperative diversity. We consider a wireless network where …
SW Kim, S Kim - 2011 International Symposium on Networking …, 2011 - ieeexplore.ieee.org
… (MAP) approach in detecting the misbehavingrelay that injects false data and/or adds channel errors into the network encoder in noisy multiple access relaynetworks. The proposed …
… detect all possible attacks. In this survey, we present misbehaviordetection mechanisms that can detect … to well-known intrusion detection for classical IT systems, these misbehavior …
… if the relays garble retransmitted signals deliberately. With this regard, we propose a noncoherent misbehaviordetection using the second-order statistics of channel estimates for relay-…
W Hou, X Wang, A Refaey - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
… detection. In this paper, a physical layer misbehaviordetection scheme operating at the source node is proposed to monitor the relaying process. As shown in Fig. 1, by listening to the …
TY Wang, PH Chou, WJ Huang - 2015 IEEE Signal Processing …, 2015 - ieeexplore.ieee.org
… In the present study, it is assumed that all of the relays within the network have an identical misbehavior model, ie, the PMF given in (4) is the same for all l. Therefore, in the remainder of …