X Tang, P Ren, Z Han - IEEE Access, 2018 - ieeexplore.ieee.org
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jamming attacks only when it detects the legitimate transmission, known as the …
S Lai, J Xia, D Zou, L Fan - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we study an intelligent secure communication scheme for cognitive networks with multiple primary transmit power, where a secondary Alice transmits its secrecy data to a …
A Gouissem, K Abualsaud, E Yaacoub… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by malicious users. To detect their presence and to avoid such attacks, several …
Y Xu, J Xia, H Wu, L Fan - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we consider a Q-learning-based power allocation strategy for a secure physical-layer system under dynamic radio environments. In such a system, the transmitter …
C Li, W Zhou, K Yu, L Fan, J Xia - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we proposed an enhanced secure scheme for the wireless communication system threatened by an intelligent attacker, which can work in eavesdropping, jamming …
S Feng, X Lu, S Sun, D Niyato - IEEE Transactions on Wireless …, 2022 - ieeexplore.ieee.org
In this paper, we study a covert Internet of Things (IoT) system. Compared with conventional IoT systems that apply cryptography and information-theoretic secrecy approaches to secure …
X Zhang, P Huang, L Guo, M Sha - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) has emerged as a new computing paradigm that promises to offer a fully connected “smart” world. However, due to the open nature of wireless medium, the …
M Guizani, A Gouissem, K Abualsaud… - … on Information and …, 2020 - ieeexplore.ieee.org
Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks …
A Soni, R Upadhyay, A Kumar - Physical Communication, 2019 - Elsevier
Achieving information security in the Internet of things (IoT) by means of physical layer key generation is an open research area. In the key generation, the secret key is generated …