Security–reliability tradeoff analysis for SWIPT-and AF-based IoT networks with friendly jammers

TN Nguyen, DH Tran, T Van Chien… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Radio-frequency (RF) energy harvesting (EH) in wireless relaying networks has attracted
considerable recent interest, especially for supplying energy to relay nodes in the Internet of …

GUIDEX: A game-theoretic incentive-based mechanism for intrusion detection networks

Q Zhu, C Fung, R Boutaba… - IEEE Journal on Selected …, 2012 - ieeexplore.ieee.org
Traditional intrusion detection systems (IDSs) work in isolation and can be easily
compromised by unknown threats. An intrusion detection network (IDN) is a collaborative …

Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for Internet of Things

M Letafati, A Kuhestani… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cooperative relaying can be introduced as a promising approach for data communication in
the Internet of Things (IoT), where the source and the destination may be placed far away. In …

Interdependent strategic security risk management with bounded rationality in the internet of things

J Chen, Q Zhu - IEEE Transactions on Information Forensics …, 2019 - ieeexplore.ieee.org
With the increasing connectivity enabled by the Internet of Things (IoT), security becomes a
critical concern, and users should invest to secure their IoT applications. Due to the massive …

Dynamic routing with security considerations

CF Kuo, AC Pang, SK Chan - IEEE transactions on parallel and …, 2008 - ieeexplore.ieee.org
Security has become one of the major issues for data communication over wired and
wireless networks. Different from the past work on the designs of cryptography algorithms …

Enhancing security via stochastic routing

S Bohacek, JP Hespanha, K Obraczka… - Proceedings …, 2002 - ieeexplore.ieee.org
Shortest path routing leaves connections at risk of interception and eavesdropping since the
path over which data packets travel is fairly predictable and easy to determine. To improve …

Privacy-aware routing in sensor networks

H Wang, B Sheng, Q Li - Computer Networks, 2009 - Elsevier
A typical sensor network application is to monitor objects, including wildlife, vehicles and
events, in which information about an object is periodically sent back to the sink. Many times …

Blockchain-based distributive auction for relay-assisted secure communications

AS Khan, Y Rahulamathavan, B Basutli, G Zheng… - IEEE …, 2019 - ieeexplore.ieee.org
Physical layer security (PLS) is considered as a promising technique to prevent information
eavesdropping in wireless systems. In this context, cooperative relaying has emerged as a …

Security and privacy in the age of the smart internet of things: An overview from a networking perspective

S Yu, G Wang, X Liu, J Niu - IEEE Communications Magazine, 2018 - ieeexplore.ieee.org
Pervasively implemented IoT systems are introducing unprecedented threats to our society.
In this article, aiming to explore the security impact from the emerging and anarchistic IoT …

Game of decoys: Optimal decoy routing through game theory

M Nasr, A Houmansadr - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Decoy routing is a promising new approach for censorship circumvention that relies on traffic
re-direction by volunteer autonomous systems. Decoy routing is subject to a fundamental …