A survey on secure group communication schemes with focus on iot communication

T Prantl, T Zeck, A Bauer, P Ten, D Prantl… - IEEE …, 2022 - ieeexplore.ieee.org
… and security evaluation of the 47 secure group communication schemes. Based on this
evaluation, we create a guideline for the selection of secure group communication schemes. …

AN-aided relay-selection scheme for securing untrusted RF-EH relay systems

A Mabrouk, A El Shafie, K Tourki… - … Green Communications …, 2017 - ieeexplore.ieee.org
… To minimize the energy consumption of the network, we propose a secure adaptive relay-based
cooperation approach. Moreover, a greedy battery-aware relay-selection scheme is …

[HTML][HTML] An authentication and secure communication scheme for in-vehicle networks based on SOME/IP

B Ma, S Yang, Z Zuo, B Zou, Y Cao, X Yan, S Zhou, J Li - Sensors, 2022 - mdpi.com
scheme and the secure communication scheme designed in this article, and its execution flow
completely follows the scheme … The effective-load length and the AEAD algorithm selected

A novel secure communication scheme in vehicular ad hoc networks

NW Wang, YM Huang, WM Chen - Computer communications, 2008 - Elsevier
… applications and interesting security challenges. To cope with these security challenges,
we propose a novel secure scheme for vehicular communication on VANETs. The proposed …

[PDF][PDF] A fast and secure selective encryption scheme using grid division method

P Agrawal, M Rajpoot - International Journal of Computer Applications, 2012 - Citeseer
… Through applying this method our proposed scheme … Selective encryption scheme along
with the issues in selection of … gird method for selective encryption scheme. The flow chart of …

Transmission mode selection scheme for physical layer security in multi-user multi-relay systems

A Mabrouk, K Tourki, N Hamdi - … Mobile Radio Communications …, 2016 - ieeexplore.ieee.org
… In particular, we propose a cooperative jamming aided secure transmission … selection
scheme is elaborated in such a way to reduce the amount of information leaked to non-selected

Joint relay and jammer selection for secure two-way relay networks

J Chen, R Zhang, L Song, Z Han… - … Forensics and Security, 2011 - ieeexplore.ieee.org
… 3 shows the ergodic secrecy rate versus the transmitted power of different selection schemes.
We can observe that the selection schemes with jamming outperform their nonjamming …

[HTML][HTML] A quality of service-aware secured communication scheme for internet of things-based networks

F Khan, AU Rehman, A Yahya, MA Jan, J Chuma… - Sensors, 2019 - mdpi.com
secured and reliable data transmission. In this paper, we propose a QoS-aware secured
communication scheme … It is justified from the figure that due to the optimal selection of CW size, …

A key distribution scheme for secure communication in acoustic sensor networks

MA Hamid, M Abdullah-Al-Wadud, MM Hassan… - Future Generation …, 2018 - Elsevier
… The path-key establishment phase assigns a path-key to selected pairs of sensor nodes in
wireless communication range that do not share a key but are connected by two or more links …

Optimal relay selection for physical-layer security in cooperative wireless networks

Y Zou, X Wang, W Shen - … on selected areas in communications, 2013 - ieeexplore.ieee.org
… Firstly, considering AF and DF relaying protocols, we propose the AF and DF based optimal
relay selection schemes which are denoted by P-AFbORS and P-DFbORS, respectively. We …