Deep reinforcement learning for cyber security

TT Nguyen, VJ Reddi - IEEE Transactions on Neural Networks …, 2021 - ieeexplore.ieee.org
The scale of Internet-connected systems has increased considerably, and these systems are
being exposed to cyberattacks more than ever. The complexity and dynamics of …

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

Well-architected wireless network security

AA Mughal - Journal of Humanities and Applied Science …, 2022 - journals.sagescience.org
In this comprehensive research article, we explore the critical aspects of well-architected
wireless network security. We examine the fundamental principles of wireless security …

Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities

N Wang, P Wang, A Alipour-Fanid… - IEEE internet of things …, 2019 - ieeexplore.ieee.org
The fifth generation (5G) wireless technologies serve as a key propellent to meet the
increasing demands of the future Internet of Things (IoT) networks. For wireless …

A review of radio frequency fingerprinting techniques

N Soltanieh, Y Norouzi, Y Yang… - IEEE Journal of Radio …, 2020 - ieeexplore.ieee.org
Radio frequency (RF) fingerprinting techniques have been used as an extra security layer
for wireless devices. Unique fingerprints are used to identify wireless devices in order to …

Machine learning for the detection and identification of Internet of Things devices: A survey

Y Liu, J Wang, J Li, S Niu… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming an indispensable part of everyday life, enabling a
variety of emerging services and applications. However, the presence of rogue IoT devices …

A survey of physical layer techniques for secure wireless communications in industry

P Angueira, I Val, J Montalban, Ó Seijo… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …

Anonymous authentication for wireless body area networks with provable security

D He, S Zeadally, N Kumar, JH Lee - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
Advances in wireless communications, embedded systems, and integrated circuit
technologies have enabled the wireless body area network (WBAN) to become a promising …

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks

X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta… - Computer Networks, 2017 - Elsevier
Wireless body area networks (WBANs) are used to collect and exchange vital and sensitive
information about the physical conditions of patients. Due to the openness and mobility of …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …