Secrecy and covert communications against UAV surveillance via multi-hop networks

HM Wang, Y Zhang, X Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The deployment of unmanned aerial vehicle (UAV) for surveillance and monitoring gives
rise to the confidential information leakage challenge in both civilian and military …

Joint resource allocation algorithm based on multi-objective optimization for wireless sensor networks

X Hao, N Yao, L Wang, J Wang - Applied Soft Computing, 2020 - Elsevier
With the limitations of the network resources and battery energy of wireless sensors, the
competition of resources in the process of communication will increase the network energy …

An adaptive secure and efficient routing protocol for mobile ad hoc networks

BK Tripathy, SK Jena, P Bera, S Das - Wireless Personal Communications, 2020 - Springer
The rapidly emerging wireless service requirements and deployment demands over last few
decades necessitates the application of Mobile Ad hoc Networks in many areas. These …

Secure cooperative hybrid VLC-RF systems

G Pan, J Ye, C Zhang, J An, H Lei… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this paper, a cooperative hybrid visible light communication (VLC)-radio frequency (RF)
system with spatially random terminals is considered. Especially, a source node () with a …

On modeling optimizations and enhancing routing protocols for wireless multihop networks

FA Al-Zahrani - IEEE Access, 2020 - ieeexplore.ieee.org
The contribution of this paper is two fold. It first analyses the flooding strategies for the
Wireless Multihop Networks (WMNs) then it enhances the reactive and proactive routing …

Three-hop untrusted relay networks with hardware imperfections and channel estimation errors for Internet of Things

M Letafati, A Kuhestani… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cooperative relaying can be introduced as a promising approach for data communication in
the Internet of Things (IoT), where the source and the destination may be placed far away. In …

[PDF][PDF] Cluster head selection and optimal multipath detection using coral reef optimization in MANET environment

S Venkatasubramanian, A Suhasini… - International Journal of …, 2022 - mecs-press.org
Mobile Ad-hoc Network (MANET) data transfer between nodes in a multi-hop way offers a
wide variety of applications. The dynamic feature of ad hoc network mobile nodes is …

Can a multi-hop link relying on untrusted amplify-and-forward relays render security?

MT Mamaghani, A Kuhestani, H Behroozi - Wireless Networks, 2021 - Springer
Cooperative relaying is utilized as an efficient method for data communication in wireless
sensor networks and the Internet of Things. However, sometimes due to the necessity of …

A secure multi-hop relay node selection scheme based data transmission in wireless ad-hoc network via block chain

SN Mahapatra, BK Singh, V Kumar - Multimedia Tools and Applications, 2022 - Springer
In today's scenario, data transmission is established through the single or multi-hop relay
nodes in Wireless Ad-Hoc Networks (WANET). Traditional relay node selection techniques …

Secure routing in multihop ad-hoc networks with srr-based reinforcement learning

J Lu, D He, Z Wang - IEEE Wireless Communications Letters, 2021 - ieeexplore.ieee.org
In this letter, a reinforcement learning-assisted secure routing methodology is proposed for
multihop ad-hoc networks in the presence of multiple eavesdroppers. Specifically, secure …