Jamming mitigation via hierarchical security game for IoT communications

X Tang, P Ren, Z Han - IEEE Access, 2018 - ieeexplore.ieee.org
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly
launch jamming attacks only when it detects the legitimate transmission, known as the …

" Borrowing Arrows with Thatched Boats": The Art of Defeating Reactive Jammers in IoT Networks

DT Hoang, DN Nguyen, MA Alsheikh… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
In this article, we introduce a novel deception strategy inspired by the" Borrowing Arrows
with Thatched Boats" strategy, one of the most famous military tactics in history, in order to …

Game theory for anti-jamming strategy in multichannel slow fading IoT networks

A Gouissem, K Abualsaud, E Yaacoub… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The open nature of the wireless communication medium renders it vulnerable to jamming
attacks by malicious users. To detect their presence and to avoid such attacks, several …

Combating jamming attacks in multi-channel IoT networks using game theory

M Guizani, A Gouissem, K Abualsaud… - … on Information and …, 2020 - ieeexplore.ieee.org
Jamming attacks are among the most widely used techniques to block and disturb legitimate
communications. Several techniques are used in the literature to combat these attacks …

Accelerated IoT anti-jamming: A game theoretic power allocation strategy

A Gouissem, K Abualsaud, E Yaacoub… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
A jamming combating power allocation strategy is proposed to secure the data
communication in IoT networks. The proposed strategy aims to minimize the worst case …

IoT anti-jamming strategy using game theory and neural network

A Gouissem, K Abualsaud, E Yaacoub… - 2020 International …, 2020 - ieeexplore.ieee.org
The Internet of things (IoT) is one of the most exposed networks to attackers due to its
widespread and its heterogeneity. In such networks, jamming attacks are widely used by …

DQN-based power control for IoT transmission against jamming

Y Chen, Y Li, D Xu, L Xiao - 2018 IEEE 87th vehicular …, 2018 - ieeexplore.ieee.org
Internet of Things (IoTs) have to address jammers, with goal to interrupt the communication
of the energy-constrained IoT devices and sometimes even cause denial-of-service attacks …

Jamming in the internet of things: A game-theoretic perspective

N Namvar, W Saad, N Bahadori… - 2016 IEEE Global …, 2016 - ieeexplore.ieee.org
Due to its scale and largely interconnected nature, the Internet of Things (IoT) will be
vulnerable to a number of security threats that range from physical layer attacks to network …

Optimal green hybrid attacks in secure IoT

B Ahuja, D Mishra, R Bose - IEEE Wireless Communications …, 2019 - ieeexplore.ieee.org
In pursuance to understand the behavior of a potential green hybrid attacker in secure
Internet-of-Things (IoT), this letter investigates optimal energy utilization from the attacker's …

Mean-field artificial noise assistance and uplink power control in covert IoT systems

S Feng, X Lu, S Sun, D Niyato - IEEE Transactions on Wireless …, 2022 - ieeexplore.ieee.org
In this paper, we study a covert Internet of Things (IoT) system. Compared with conventional
IoT systems that apply cryptography and information-theoretic secrecy approaches to secure …