Q Zhu, C Fung, R Boutaba… - IEEE Journal on Selected …, 2012 - ieeexplore.ieee.org
Traditional intrusion detection systems (IDSs) work in isolation and can be easily compromised by unknown threats. An intrusion detection network (IDN) is a collaborative …
Cooperative relaying can be introduced as a promising approach for data communication in the Internet of Things (IoT), where the source and the destination may be placed far away. In …
J Chen, Q Zhu - IEEE Transactions on Information Forensics …, 2019 - ieeexplore.ieee.org
With the increasing connectivity enabled by the Internet of Things (IoT), security becomes a critical concern, and users should invest to secure their IoT applications. Due to the massive …
CF Kuo, AC Pang, SK Chan - IEEE transactions on parallel and …, 2008 - ieeexplore.ieee.org
Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms …
Shortest path routing leaves connections at risk of interception and eavesdropping since the path over which data packets travel is fairly predictable and easy to determine. To improve …
H Wang, B Sheng, Q Li - Computer Networks, 2009 - Elsevier
A typical sensor network application is to monitor objects, including wildlife, vehicles and events, in which information about an object is periodically sent back to the sink. Many times …
Physical layer security (PLS) is considered as a promising technique to prevent information eavesdropping in wireless systems. In this context, cooperative relaying has emerged as a …
S Yu, G Wang, X Liu, J Niu - IEEE Communications Magazine, 2018 - ieeexplore.ieee.org
Pervasively implemented IoT systems are introducing unprecedented threats to our society. In this article, aiming to explore the security impact from the emerging and anarchistic IoT …
M Nasr, A Houmansadr - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Decoy routing is a promising new approach for censorship circumvention that relies on traffic re-direction by volunteer autonomous systems. Decoy routing is subject to a fundamental …