[HTML][HTML] Satellite-based communications security: A survey of threats, solutions, and research challenges

P Tedeschi, S Sciancalepore, R Di Pietro - Computer Networks, 2022 - Elsevier
Satellite-based Communication (SATCOM) systems are gaining renewed momentum in
Industry and Academia, thanks to innovative services introduced by leading tech companies …

5G security challenges and solutions: a review by OSI layers

S Sullivan, A Brighente, SAP Kumar, M Conti - IEEE Access, 2021 - ieeexplore.ieee.org
The Fifth Generation of Communication Networks (5G) envisions a broader range of
services compared to previous generations, supporting an increased number of use cases …

MEC-based dynamic controller placement in SD-IoV: A deep reinforcement learning approach

B Li, X Deng, X Chen, Y Deng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The flow fluctuations in the highly dynamic Internet of Vehicles (IoV) make the IoV difficult to
provide reliable and scalable wireless network services for the emerging applications in the …

[HTML][HTML] A comprehensive survey on segment routing traffic engineering

D Wu, L Cui - Digital Communications and Networks, 2023 - Elsevier
Traffic Engineering (TE) enables management of traffic in a manner that optimizes utilization
of network resources in an efficient and balanced manner. However, existing TE solutions …

[HTML][HTML] Visually meaningful image encryption algorithm based on digital signature

X Huang, Y Dong, G Ye, WS Yap, BM Goi - Digital Communications and …, 2023 - Elsevier
Traditional image encryption algorithms transform a plain image into a noise-like image. To
lower the chances for the encrypted image being detected by the attacker during the image …

[HTML][HTML] Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack

X Xu, H Hu, Y Liu, J Tan, H Zhang, H Song - Digital Communications and …, 2022 - Elsevier
Eavesdropping attacks have become one of the most common attacks on networks because
of their easy implementation. Eavesdropping attacks not only lead to transmission data …

A three-party hierarchical game for physical layer security aware wireless communications with dynamic trilateral coalitions

R Chen, C Yi, K Zhu, B Chen, J Cai… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, a novel hierarchical game framework for physical layer security (PLS) aware
wireless communications with dynamic trilateral coalitions is studied. In the considered …

Toras: Trustworthy load-balanced opportunistic routing for asynchronous duty-cycled wsns

MUF Qaisar, X Wang, A Hawbani, A Khan… - IEEE Systems …, 2022 - ieeexplore.ieee.org
As opportunistic routing (OR) becomes more popular in low-duty wireless sensor networks
(WSNs), there is a greater demand for reliable and consistent data transmission. Only …

AI-assisted secure data transmission techniques for next-generation HetNets: A review

H Sharma, G Sharma, N Kumar - Computer Communications, 2023 - Elsevier
Abstract Heterogeneous Networks (HetNets) play an imperative role in enhancing the
quality-of-service (QoS) for end-users by increasing the spectral efficiency (SE) of the …

Low‐cost regional‐based congestion‐aware routing algorithm for 2D mesh NoC

S Vazifedunn, A Reza… - International Journal of …, 2023 - Wiley Online Library
Given the advantages of network‐on‐chips (NoCs), they are rapidly improving to replace
other forms of System‐on‐Chip (SoC) designs. Although various factors improve the NoC's …