Secure routing protocols for source node privacy protection in multi-hop communication wireless networks

LC Mutalemwa, S Shin - Energies, 2020 - mdpi.com
Traffic analysis attacks are common in monitoring wireless sensor networks (WSNs). In the
attacks, adversaries analyze the traffic pattern to obtain critical information such as the …

On the capacity of rate-adaptive packetized wireless communication links under jamming

K Firouzbakht, G Noubir, M Salehi - … of the fifth ACM conference on …, 2012 - dl.acm.org
We formulate the interaction between the communicating nodes and an adversary within a
game-theoretic context. We show that earlier information-theoretic capacity results for a …

A multi-domain anti-jamming defense scheme in heterogeneous wireless networks

L Jia, Y Xu, Y Sun, S Feng, L Yu, A Anpalagan - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we investigate the anti-jamming problem in heterogeneous wireless networks.
Although there are many studies on the anti-jamming defense problem in both power …

A dynamic secure QoS routing protocol for wireless ad hoc networks

T Zhu, M Yu - 2006 IEEE Sarnoff Symposium, 2006 - ieeexplore.ieee.org
Due to its high flexibility, mobility and low cost features, wireless ad hoc network has been
widely used in various applications. Security and quality of service (QoS) requirements are …

Coping with a smart jammer in wireless networks: A Stackelberg game approach

D Yang, G Xue, J Zhang, A Richa… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Jamming defense is an important yet challenging problem. In this paper, we study the
jamming defense problem in the presence of a smart jammer, who can quickly learn the …

A cartel maintenance framework to enforce cooperation in wireless networks with selfish users

Z Han, Z Ji, KJR Liu - IEEE Transactions on Wireless …, 2008 - ieeexplore.ieee.org
In distributed wireless networks without centralized control, each user is its own authority to
maximize its own performance. This distributed characteristic provides the users with the …

On the price of security in large-scale wireless ad hoc networks

C Zhang, Y Song, Y Fang… - IEEE/ACM Transactions on …, 2011 - ieeexplore.ieee.org
Security always comes with a price in terms of performance degradation, which should be
carefully quantified. This is especially the case for wireless ad hoc networks (WANETs) …

Improved wireless secrecy rate using distributed auction theory

Z Han, N Marina, M Debbah… - 2009 Fifth International …, 2009 - ieeexplore.ieee.org
Physical layer security is an emerging security area that explores possibilities of achieving
perfect secrecy data transmission between the intended network nodes, while possible …

Social tie based cooperative jamming for physical layer security

L Tang, H Chen, Q Li - IEEE Communications Letters, 2015 - ieeexplore.ieee.org
In this letter, we investigate the cooperative jamming decision problem among multiple
jammers for physical layer security. We introduce the social tie concept to model the …

Jamming mitigation in multi-radio wireless networks: Reactive or proactive?

S Khattab, D Mosse, R Melhem - … of the 4th international conference on …, 2008 - dl.acm.org
Jamming is a serious security problem in wireless networks. Recently, software-based
channel hopping has received attention as a jamming countermeasure. In particular …