Y Xu, J Liu, Y Shen, X Jiang, Y Ji… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper focuses on the QoS-aware secure routing design based on the physical layer security technology for a multi-hop wireless network consisting of legitimate nodes …
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jamming attacks only when it detects the legitimate transmission, known as the …
Due to its scale and largely interconnected nature, the Internet of Things (IoT) will be vulnerable to a number of security threats that range from physical layer attacks to network …
V Kiran, S Rani, P Singh - Wireless Personal Communications, 2020 - Springer
The internet of things (IoT) has become an emerging technology owing to the rapidly increasing number of devices and their connectivity to the internet. Routing protocol for low …
Y Huo, J Fan, Y Wen, R Li - Tsinghua Science and Technology, 2021 - ieeexplore.ieee.org
In this paper, we design a friendly jammer selection scheme for the social Internet of Things (IoT). A typical social IoT is composed of a cellular network with underlaying Device-to …
The problem of cooperative spectrum leasing to unlicensed Internet of Things (IoT) devices is studied to account for potential selfish behavior of these devices. A distributed game …
W Chen, M Zhang, G Hu, X Tang, AK Sangaiah - IEEE Access, 2017 - ieeexplore.ieee.org
In wireless sensor networks, it is a typical threat to source privacy that an attacker performs backtracing strategy to locate source nodes by analyzing transmission paths. With the …
With the development of the Internet of Things (IoT), Smart Data, which effectively support the IoT for planning, operation, monitoring, control, and intelligent decision making, has …
In many Internet of Thing (IoT) application domains security is a critical requirement, because malicious parties can undermine the effectiveness of IoT-based systems by …