Reinforcement learning for iot security: A comprehensive survey

A Uprety, DB Rawat - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The number of connected smart devices has been increasing exponentially for different
Internet-of-Things (IoT) applications. Security has been a long run challenge in the IoT …

Smart jamming attacks in 5G new radio: A review

Y Arjoune, S Faruque - 2020 10th annual computing and …, 2020 - ieeexplore.ieee.org
The fifth generation of wireless cellular networks (5G) is expected to be the infrastructure for
emergency services, natural disasters rescue, public safety, and military communications …

A precise synchronization method for future wireless TSN networks

AM Romanov, F Gringoli… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Time-sensitive networking (TSN) is the most promising time-deterministic wired
communication approach for industrial applications. To extend TSN to “IEEE 802.11” …

Jamming detection at the edge of drone networks using multi-layer perceptrons and decision trees

C Greco, P Pace, S Basagni, G Fortino - Applied Soft Computing, 2021 - Elsevier
As wireless networks play an increasingly key role in everyday life, it is necessary to secure
them from radio frequency attacks, such as jamming, which are hard to detect, especially …

A survey on indoor positioning security and privacy

Y Sartayeva, HCB Chan - Computers & Security, 2023 - Elsevier
With rising demand for indoor location-based services (LBS) such as location-based
marketing, mobile navigation, etc., there has been considerable interest in indoor …

Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …

Virtual exams: has COVID-19 provided the impetus to change assessment methods in medicine?

M Pettit, S Shukla, J Zhang, KHS Kumar… - Bone & Joint …, 2021 - boneandjoint.org.uk
Aims The ongoing COVID-19 pandemic has disrupted and delayed medical and surgical
examinations where attendance is required in person. Our article aims to outline the validity …

Machine learning-based jamming attack classification and effective defense technique

SJ Lee, YR Lee, SE Jeon, IG Lee - Computers & Security, 2023 - Elsevier
The fourth industrial revolution has resulted in the intelligent Internet of Things being widely
used for home networking applications and smart infrastructure. Consequently, wireless …

An analysis on optimal attack schedule based on channel hopping scheme in cyber-physical systems

R Gan, Y Xiao, J Shao, J Qin - IEEE transactions on cybernetics, 2019 - ieeexplore.ieee.org
In this paper, we investigate the issue of security on the remote state estimation in cyber-
physical systems (CPSs), where a wireless sensor utilizes the channel hopping scheme to …

An adaptive anti-jamming system in HyperLedger-based wireless sensor networks

B Mbarek, M Ge, T Pitner - Wireless Networks, 2022 - Springer
Using new methodologies such as Blockchain in data communications in wireless sensor
networks (WSN) has emerged owing to the proliferation of collaborative technologies …