Secrecy and covert communications against UAV surveillance via multi-hop networks

HM Wang, Y Zhang, X Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The deployment of unmanned aerial vehicle (UAV) for surveillance and monitoring gives
rise to the confidential information leakage challenge in both civilian and military …

QoS-aware secure routing design for wireless networks with selfish jammers

Y Xu, J Liu, Y Shen, X Jiang, Y Ji… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper focuses on the QoS-aware secure routing design based on the physical layer
security technology for a multi-hop wireless network consisting of legitimate nodes …

Incentive jamming-based secure routing in decentralized internet of things

Y Xu, J Liu, Y Shen, J Liu, X Jiang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
This article focuses on the secure routing problem in the decentralized Internet of Things
(IoT). We consider a typical decentralized IoT scenario composed of peer legitimate devices …

Data compression and transmission techniques in wireless adhoc networks: a review

V Vidhya, M Madheswaran - … and Networking: Proceedings of IC-ICN 2021, 2022 - Springer
A Wireless ad hoc network (WANET) is a decentralized brand where all nodes compete in
routing by promoting data for supplementary nodes. This is arranged in a disaster region to …

QoS and jamming-aware wireless networking using deep reinforcement learning

N Abuzainab, T Erpek, K Davaslioglu… - MILCOM 2019-2019 …, 2019 - ieeexplore.ieee.org
The problem of quality of service (QoS) and jamming-aware communications is considered
in an adversarial wireless network subject to external eavesdropping and jamming attacks …

Secure communication in non-geostationary orbit satellite systems: A physical layer security perspective

Y Xiao, J Liu, Y Shen, X Jiang, N Shiratori - IEEE Access, 2018 - ieeexplore.ieee.org
Satellite communication systems serve as an indispensable component of wireless
heterogeneous networks in 5G era for providing various critical civil and military …

Secure routing with power optimization for ad-hoc networks

HM Wang, Y Zhang, DWK Ng… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we consider the problem of joint secure routing and transmit power
optimization for a multi-hop ad-hoc network under the existence of randomly distributed …

An energy-efficient secure forwarding scheme for qos guarantee in wireless sensor networks

D Kim, J Yun, D Kim - Electronics, 2020 - mdpi.com
Many wireless sensor network (WSN) applications require both security and quality-of-
service (QoS) to be guaranteed simultaneously. However, ensuring both security and QoS is …

A methodology to select topology generators for wanet simulations (extended version)

M O'Sullivan, L Aniello, V Sassone - arXiv preprint arXiv:1908.09577, 2019 - arxiv.org
Many academic and industrial research works on WANETs rely on simulations, at least in
the first stages, to obtain preliminary results to be subsequently validated in real settings …

[PDF][PDF] 无线自组织网络的联合安全路由选择和功率优化算法

惠鏸, 张晓静 - 电子与信息学报, 2020 - jeit.ac.cn
针对无线自组织网络在窃听环境中的安全传输问题, 该文提出了一种无线多跳自组织网络的联合
安全路由和功率优化算法. 首先, 在窃听者服从泊松簇过程(PCP) 这一假设下推导得到了系统 …