Enhanced secure transmission against intelligent attacks

C Li, W Zhou, K Yu, L Fan, J Xia - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we proposed an enhanced secure scheme for the wireless communication
system threatened by an intelligent attacker, which can work in eavesdropping, jamming …

EigenTrust-based non-cooperative game model assisting ACO look-ahead secure routing against selfishness

S Subbaraj, P Savarimuthu - EURASIP Journal on Wireless …, 2014 - Springer
In mobile ad hoc networks (MANETs), selfish behavior is observed when nodes fail to
forward data packets which are actually intended. This is generally assumed to be a kind …

Wireless jamming attacks under dynamic traffic uncertainty

YE Sagduyu, RA Berryt… - … Symposium on Modeling …, 2010 - ieeexplore.ieee.org
We analyze the effects of dynamic packet traffic on jamming attacks in wireless networks. For
random access over collision channels, the jamming problem is formulated as a non …

Game theoretical secure wireless communication for UAV-assisted vehicular Internet of Things

B Liu, Z Su, Q Xu - China Communications, 2021 - ieeexplore.ieee.org
With the ever-expanding applications of vehicles and the development of wireless
communication technology, the burgeoning unmanned aerial vehicle (UAV) assisted …

Mitigating stealthy jamming attacks in low-power and lossy wireless networks

J Heo, JJ Kim, J Paek, S Bahk - Journal of Communications …, 2018 - ieeexplore.ieee.org
Jamming in wireless networks has advanced to be more stealthy and long-lasting with
limited energy. Stealthy attackers transmit short jamming signals to become less detectable …

Mitigating control-channel jamming attacks in multi-channel ad hoc networks

L Lazos, S Liu, M Krunz - Proceedings of the second ACM conference …, 2009 - dl.acm.org
We address the problem of control-channel jamming attacks in multi-channel ad hoc
networks. Deviating from the traditional view that sees jamming attacks as a physical-layer …

Secure communication with a wireless-powered friendly jammer

W Liu, X Zhou, S Durrani… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we propose using a wireless-powered friendly jammer to enable secure
communication between a source node and destination node, in the presence of an …

Power control Stackelberg game in cooperative anti-jamming communications

Y Li, L Xiao, J Liu, Y Tang - The 2014 5th International …, 2014 - ieeexplore.ieee.org
As wireless networks are vulnerable to malicious attacks, security issues have aroused
enormous research interest. In this paper, we focus on the anti-jamming power control of …

A composite trust model for secure routing in mobile ad-hoc networks

RH Jhaveri, NM Patel, DC Jinwala, JH Ortiz… - Ad Hoc …, 2017 - books.google.com
It is imperative to address the issue of secure routing in mobile ad-hoc networks (MANETs)
where the nodes seek for cooperative and trusted behaviour from the peer nodes in the …

Asymptotic analysis on secrecy capacity in large-scale wireless networks

J Zhang, L Fu, X Wang - IEEE/ACM Transactions on …, 2013 - ieeexplore.ieee.org
Since wireless channel is vulnerable to eavesdroppers, the secrecy during message
delivery is a major concern in many applications such as commercial, governmental, and …