Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for Internet of Things

M Letafati, A Kuhestani… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cooperative relaying can be introduced as a promising approach for data communication in
the Internet of Things (IoT), where the source and the destination may be placed far away. In …

Security and privacy in the age of the smart internet of things: An overview from a networking perspective

S Yu, G Wang, X Liu, J Niu - IEEE Communications Magazine, 2018 - ieeexplore.ieee.org
Pervasively implemented IoT systems are introducing unprecedented threats to our society.
In this article, aiming to explore the security impact from the emerging and anarchistic IoT …

Secure cooperation in autonomous mobile ad-hoc networks under noise and imperfect monitoring: A game-theoretic approach

W Yu, KJR Liu - IEEE transactions on information forensics and …, 2008 - ieeexplore.ieee.org
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation
among selfish nodes, especially when some nodes may be malicious. In this paper, we …

" Borrowing Arrows with Thatched Boats": The Art of Defeating Reactive Jammers in IoT Networks

DT Hoang, DN Nguyen, MA Alsheikh… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
In this article, we introduce a novel deception strategy inspired by the" Borrowing Arrows
with Thatched Boats" strategy, one of the most famous military tactics in history, in order to …

Enhancing security via stochastic routing

S Bohacek, JP Hespanha, K Obraczka… - Proceedings …, 2002 - ieeexplore.ieee.org
Shortest path routing leaves connections at risk of interception and eavesdropping since the
path over which data packets travel is fairly predictable and easy to determine. To improve …

TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing

W Fang, W Zhang, W Chen, Y Liu, C Tang - wireless networks, 2020 - Springer
Based on fog computer, an industrial wireless sensor network (F-IWSN) is a novel wireless
sensor network in the industry. It not only can more efficiently reduce information …

Securing large-scale d2d networks using covert communication and friendly jamming

S Feng, X Lu, S Sun, D Niyato… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We exploit both covert communication and friendly jamming to propose a friendly jamming-
assisted covert communication and use it to doubly secure a large-scale device-to-device …

Node-oriented secure data transmission algorithm based on IoT system in social networks

X Li, J Wu - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
With the rapid development of information technology, the global network is already in a
relatively open environment. In this open environment, mobile devices in the Internet of …

Chaotic whale crow optimization algorithm for secure routing in the IoT environment

MG Raj, SK Pani - International Journal on Semantic Web and …, 2022 - igi-global.com
This paper solves the internet of things (IoT) security issues by introducing a chaotic whale
crow (CWC) optimization, which is the integration of chaotic whale optimization algorithm …

Blockchain-based secure routing strategy for airborne mesh networks

Y Liu, J Wang, H Song, J Li… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Mesh networks are widely used to provide flexible communication support for spatially
distributed devices in Cyber-Physical Systems (CPS), such as UAS (Unmanned Aerial …