Intelligent secure communication for Internet of Things with statistical channel state information of attacker

J Xia, Y Xu, D Deng, Q Zhou, L Fan - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate the power control strategy of intelligent secure communication
with statistic channel state information (CSI) for Internet of Things (IoT) networks, where a …

Jamming mitigation via hierarchical security game for IoT communications

X Tang, P Ren, Z Han - IEEE Access, 2018 - ieeexplore.ieee.org
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly
launch jamming attacks only when it detects the legitimate transmission, known as the …

Intelligent secure communication for cognitive networks with multiple primary transmit power

S Lai, J Xia, D Zou, L Fan - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we study an intelligent secure communication scheme for cognitive networks
with multiple primary transmit power, where a secondary Alice transmits its secrecy data to a …

Game theory for anti-jamming strategy in multichannel slow fading IoT networks

A Gouissem, K Abualsaud, E Yaacoub… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The open nature of the wireless communication medium renders it vulnerable to jamming
attacks by malicious users. To detect their presence and to avoid such attacks, several …

Q-learning based physical-layer secure game against multiagent attacks

Y Xu, J Xia, H Wu, L Fan - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we consider a Q-learning-based power allocation strategy for a secure
physical-layer system under dynamic radio environments. In such a system, the transmitter …

Enhanced secure transmission against intelligent attacks

C Li, W Zhou, K Yu, L Fan, J Xia - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we proposed an enhanced secure scheme for the wireless communication
system threatened by an intelligent attacker, which can work in eavesdropping, jamming …

Mean-field artificial noise assistance and uplink power control in covert IoT systems

S Feng, X Lu, S Sun, D Niyato - IEEE Transactions on Wireless …, 2022 - ieeexplore.ieee.org
In this paper, we study a covert Internet of Things (IoT) system. Compared with conventional
IoT systems that apply cryptography and information-theoretic secrecy approaches to secure …

Incentivizing relay participation for securing IoT communication

X Zhang, P Huang, L Guo, M Sha - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) has emerged as a new computing paradigm that promises to offer a
fully connected “smart” world. However, due to the open nature of wireless medium, the …

Combating jamming attacks in multi-channel IoT networks using game theory

M Guizani, A Gouissem, K Abualsaud… - … on Information and …, 2020 - ieeexplore.ieee.org
Jamming attacks are among the most widely used techniques to block and disturb legitimate
communications. Several techniques are used in the literature to combat these attacks …

Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging

A Soni, R Upadhyay, A Kumar - Physical Communication, 2019 - Elsevier
Achieving information security in the Internet of things (IoT) by means of physical layer key
generation is an open research area. In the key generation, the secret key is generated …