Stochastic cost minimization mechanism based on identifier network for IoT security

S Yao, Z Li, J Guan, Y Liu - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
An identifier network (IN), as one of the promising network architectures to solve the IP dual
properties problems, has been applied in many areas, including Internet of Things (IoT) for …

Optimal secure two-layer IoT network design

J Chen, C Touati, Q Zhu - IEEE Transactions on Control of …, 2019 - ieeexplore.ieee.org
With the remarkable growth of the Internet and communication technologies over the past
few decades, Internet of Things (IoTs) is enabling the ubiquitous connectivity of …

Joint Information and Jamming Beamforming for Securing IoT Networks With Rate-Splitting

B Qiu, W Cheng, W Zhang - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The goal of this article is to address the physical layer (PHY) security problem for multiuser
multiple-input–single-output (MU-MISO) Internet of Things (IoT) systems in the presence of …

Secure key distribution for IoT networks based on physical layer security

T Alshamaseen, S Althunibat… - 2021 IEEE 26th …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) technology has spread across many fields. IoT networks contain a
large number of devices that work together and exchange a large amount of information …

SOS: NDN based service-oriented game-theoretic efficient security scheme for IoT networks

P Kar, S Misra, AK Mandal… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of heterogeneous physical devices connected over the
Internet. Each of the devices is capable of collecting and processing data. Due to the …

Physical layer security in iot: A spatial-temporal perspective

S Zhang, J Peng, K Huang, X Xu… - 2017 9th International …, 2017 - ieeexplore.ieee.org
Delay and security are both highly concerned in the Internet of Things (IoT). In this paper, we
set up a secure analytical framework for IoT networks to characterize the network delay …

A neural-network-based optimal resource allocation method for secure IIoT network

P Goswami, A Mukherjee, M Maiti… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Data security and resource allocation are two important terms associated with the Internet of
Things (IoT). This recent technical evolution has made its mark in industrial applications …

Toward secure IoT networks in healthcare applications: A game-theoretic anti-jamming framework

A Gouissem, K Abualsaud, E Yaacoub… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is used to interconnect a massive number of heterogeneous
resource-constrained smart devices. This makes such networks exposed to various types of …

Decision tree based user-centric security solution for critical IoT infrastructure

D Puthal, S Wilson, A Nanda, M Liu, S Swain… - Computers and …, 2022 - Elsevier
Data processing in real-time brings better business modeling and an intuitive plan of action.
Internet of things (IoT), being a source of sensitive data collected and communicated through …

Intelligent secure communication for Internet of Things with statistical channel state information of attacker

J Xia, Y Xu, D Deng, Q Zhou, L Fan - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate the power control strategy of intelligent secure communication
with statistic channel state information (CSI) for Internet of Things (IoT) networks, where a …