Distributed algorithms for secure multipath routing in attack-resistant networks

PPC Lee, V Misra, D Rubenstein - IEEE/ACM Transactions on …, 2007 - ieeexplore.ieee.org
To proactively defend against intruders from readily jeopardizing single-path data sessions,
we propose a distributed secure multipath solution to route data across multiple paths so …

Spatial anti-jamming scheme for internet of satellites based on the deep reinforcement learning and stackelberg game

C Han, L Huo, X Tong, H Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The anti-jamming communication of the heterogeneous Internet of Satellites (IoS) has drawn
increasing attentions due to the smart jamming and high dynamics. This paper investigates …

Economic incentive based solution against distributed denial of service attacks for IoT customers

V Adat, A Dahiya, BB Gupta - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
The market of Internet of Things is increasing at a very high rate. As most of the devices get
connected to the internet, the security challenges of these devices are also increasing. With …

Simultaneous secure and covert transmissions against two attacks under practical assumptions

M Forouzesh, FS Khodadad, P Azmi… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In practice, Internet of Things (IoT) applications may face two different hostile attacks, ie,
overhearing the broadcasted data and detecting the presence of data communication …

Privacy-preserving incentive mechanism for multi-leader multi-follower IoT-edge computing market: A reinforcement learning approach

H Xu, X Qiu, W Zhang, K Liu, S Liu, W Chen - Journal of Systems …, 2021 - Elsevier
Computation offloading is a promising solution for resource-limited IoT devices to
accomplish computation-intensive tasks. In order to promote the service trading between …

[HTML][HTML] Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack

X Xu, H Hu, Y Liu, J Tan, H Zhang, H Song - Digital Communications and …, 2022 - Elsevier
Eavesdropping attacks have become one of the most common attacks on networks because
of their easy implementation. Eavesdropping attacks not only lead to transmission data …

Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions

M Sharma, S Pant, D Kumar Sharma… - Transactions on …, 2021 - Wiley Online Library
Abstract In a wireless Industrial Internet of Things (IIoT) network, enforcing security is a
challenge due to the large number of devices forming the network and their limited …

Fedtor: An anonymous framework of federated learning in internet of things

Y Chen, Y Su, M Zhang, H Chai… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
With a large number of devices and a wealth of user data sets, the Internet of Things (IoT)
has become a great host for federated learning (FL). At the same time, the massive amount …

A trust with abstract information verified routing scheme for cyber-physical network

X Liu, N Xiong, N Zhang, A Liu, H Shen… - IEEE Access, 2018 - ieeexplore.ieee.org
Cyber-physical network (CPN) as well as cyber-physical social computing and networking
(CPSCN), as the next generation of computing and networking, utilize a wide variety of …

Partner selection and incentive mechanism for physical layer security

N Zhang, N Cheng, N Lu, X Zhang… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We study user cooperation to enhance the physical layer security. Specifically, the source
cooperates with friendly intermediate nodes to transmit message securely in the presence of …