Trust management system design for the Internet of Things: A context-aware and multi-service approach

YB Saied, A Olivereau, D Zeghlache, M Laurent - Computers & Security, 2013 - Elsevier
This work proposes a new trust management system (TMS) for the Internet of Things (IoT).
The wide majority of these systems are today bound to the assessment of trustworthiness …

Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system

C Jeong, IM Kim, DI Kim - IEEE Transactions on Signal …, 2011 - ieeexplore.ieee.org
An amplify-and-forward (AF) multiple-input multiple-output (MIMO) relay network composed
of a source, a relay, and a destination is considered, where transmit beamforming is …

Risk-aware cooperative spectrum access for multi-channel cognitive radio networks

N Zhang, N Cheng, N Lu, H Zhou… - IEEE Journal on …, 2014 - ieeexplore.ieee.org
In this paper, risk-aware cooperative spectrum access schemes for cognitive radio networks
(CRNs) with multiple channels are proposed, whereby multiple primary users (PUs) …

Destination-aided cooperative jamming for dual-hop amplify-and-forward MIMO untrusted relay systems

J Xiong, L Cheng, D Ma, J Wei - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we consider a dual-hop amplify-and-forward (AF) multiple-input-multiple-
output (MIMO) relay network, where the source, relay, and destination are each equipped …

An intrusion detection system for detecting compromised gateways in clustered IoT networks

NV Abhishek, TJ Lim, B Sikdar… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
It is well known that clustering IoT devices will help to alleviate the network scalability
problem in IoT networks. However, clustering also provides an opportunity for an adversary …

Distributed widely linear Kalman filtering for frequency estimation in power networks

S Kanna, DH Dini, Y Xia, SY Hui… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Motivated by the growing need for robust and accurate frequency estimators at the low and
medium-voltage distribution levels and the emergence of ubiquitous sensors networks for …

[HTML][HTML] Opportunistic large array propagation models: A comprehensive survey

F Nawaz, H Kumar, SA Hassan, H Jung - Sensors, 2021 - mdpi.com
Enabled by the fifth-generation (5G) and beyond 5G communications, large-scale
deployments of Internet-of-Things (IoT) networks are expected in various application fields to …

Cooperative key agreement for wireless networking: Key rates and practical protocol design

N Wang, N Zhang, TA Gulliver - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In this paper, we investigate the design of a practical information-theoretically secure secret
key agreement protocol for a cooperative wireless network employing standard modulation …

Opportunistic transmission of nonregenerative network with untrusted relay

MC Ju, DH Kim, KS Hwang - IEEE Transactions on Vehicular …, 2014 - ieeexplore.ieee.org
In this paper, we consider an opportunistic transmission scheme of nonregenerative relay
networks consisting of a source, a destination, and an untrusted relay, where the relay has a …

Physical integrity check in cooperative relay communications

SW Kim - IEEE Transactions on Wireless Communications, 2015 - ieeexplore.ieee.org
We propose a physical-layer technique for checking the integrity of information provided by
an intermediate node (relay) in cooperative relay communication systems. The proposed …