[HTML][HTML] Cyber-security of smart grids: Attacks, detection, countermeasure techniques, and future directions

TT Khoei, HO Slimane, N Kaabouch - Communications and Network, 2022 - scirp.org
One of the significant challenges that smart grid networks face is cyber-security. Several
studies have been conducted to highlight those security challenges. However, the majority …

Machine learning-based spoofing attack detection in mmWave 60GHz IEEE 802.11 ad networks

N Wang, L Jiao, P Wang, W Li… - IEEE INFOCOM 2020 …, 2020 - ieeexplore.ieee.org
Spoofing attacks pose a serious threat to wireless communications. Exploiting physical-layer
features to counter spoofing attacks is a promising solution. Although various physical-layer …

ML Techniques for Attack and Anomaly Detection in Internet of Things Networks

V Mahor, S Bijrothiya, R Mishra… - … Vehicles Volume 1 …, 2022 - Wiley Online Library
Summary The Internet of Things (IoT), is a fundamental driver of smart cities. It is the
champion of the global collaboration of machines/things, people, huge data, and processes …

RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications

M Al-Zubaidie, Z Zhang, J Zhang - Security and …, 2019 - Wiley Online Library
Providing a mechanism to authenticate users in healthcare applications is an essential
security requirement to prevent both external and internal attackers from penetrating …

Security and Privacy for IoT-based Smart Cities

P Whig, S Kouser, K Puruhit, N Alam… - Internet of Things and …, 2022 - taylorfrancis.com
Communities get a unique characteristic that relies on the combination of Information and
Communications Technology (ICT) services and improvements to manage complex data in …

Security model of authentication at the physical layer and performance analysis over fading channels

N Xie, C Chen, Z Ming - IEEE Transactions on Dependable and …, 2018 - ieeexplore.ieee.org
Compared with conventional authentication schemes, which utilize cryptographic
mechanisms and operate at an upper layer, authentication at the physical (PHY) layer …

Physical layer authentication based on channel information and machine learning

F Pan, H Wen, R Liao, Y Jiang, A Xu… - … IEEE Conference on …, 2017 - ieeexplore.ieee.org
Most of the physical-layer authentication methods are based on the pre-knowledge of the
channel information and the threshold is fixed before the communication process. In this …

Multiuser physical-layer authentication based on latent perturbed neural networks for Industrial Internet of Things

R Meng, X Xu, H Sun, H Zhao, B Wang… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Recently, learning (DL)-based physical-layer authentication (PLA) has attracted much
attention since artificial neural networks (ANNs) can be built to extract useful features from …

Defense scheme against advanced persistent threats in mobile fog computing security

M Waqas, S Tu, J Wan, T Mir, H Alasmary, G Abbas - Computer Networks, 2023 - Elsevier
In mobile fog computing (MFC), data processing and applications are concentrated in
devices at the network's edge. This means that data can be processed in local intelligent …

Optimal pricing of Internet of Things: A machine learning approach

MA Alsheikh, DT Hoang, D Niyato… - IEEE Journal on …, 2020 - ieeexplore.ieee.org
Internet of things (IoT) produces massive data from devices embedded with sensors. The IoT
data allows creating profitable services using machine learning. However, previous …