An efficient hybrid IDS deployment architecture for multi-hop clustered wireless sensor networks

DW Huang, F Luo, J Bi, M Sun - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Deploying Intrusion Detection Systems (IDSs) is an essential way to enhance the security of
Multi-hop Clustered Wireless Sensor Networks (MCWSNs). The conventional IDS …

Performance analysis of secure communications over dual correlated Rician fading channels

KN Le - IEEE Transactions on Communications, 2018 - ieeexplore.ieee.org
Wireless secrecy under dual correlated Rician fading environments is theoretically studied
for correlated source-destination and source-wiretapper channels. Without considering …

Low energy consumption and data redundancy approach of wireless sensor networks with bigdata

X Fan, W Wei, M Wozniak, Y Li - Information Technology and Control, 2018 - itc.ktu.lt
To reduce the data redundancy and energy consumption caused by the explosive growth of
data in wireless sensor networks, this paper presents a node data image based mean …

A non-orthogonal multiple access and interference mitigation combined strategy in multi-user networks

Y Tian - Wireless Personal Communications, 2019 - Springer
In contrast to the orthogonal multiple access (OMA), non-orthogonal multiple access (NOMA)
was shown to have outstanding performance in terms of spectrum efficiency, user fairness …

Legitimate eavesdropping with wireless powered proactive full-duplex eavesdroppers

Q Li - 2021 IEEE Wireless Communications and Networking …, 2021 - ieeexplore.ieee.org
In this paper, legitimate eavesdropping in a point-to-point suspicious communication
network with multiple wireless powered full-duplex legitimate eavesdroppers is investigated …

Privacy-oriented Coded Caching in Mobile Information-centric Networking

B Yang, Y Guo, X Chen - 2023 Asia Pacific Signal and …, 2023 - ieeexplore.ieee.org
Wireless network communication has the characteristics of broadcasting and bandwidth
limitation, which makes it difficult for devices in the wireless network to obtain high-quality …

SOP under dual correlated Rician fading

KN Le - 2018 24th Asia-Pacific Conference on …, 2018 - ieeexplore.ieee.org
Under dual correlated Rician fading and unknown wiretapper's channel state information,
secrecy outage probability (SOP) is theoretically studied for the first time in this paper. The …

Innovative audio mosaic technique by permutations

EYN Sun, HC Wu, C Busch, SCH Huang… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
Smart assistants have been indispensable mechanisms on electronic devices nowadays.
However, as smart devices become prevalent everywhere, eavesdropping attacks could be …

Collusion-resistant jamming for securing legacy clients in wireless networks

D Xie, W Mao, A Tang, X Wang - IEEE Transactions on Mobile …, 2019 - ieeexplore.ieee.org
Existing physical layer security schemes are inapplicable to legacy devices operating on
long coherence-time channels, since they demand changes in the physical layer. To this …