A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

A comprehensive survey on mobility-aware D2D communications: Principles, practice and challenges

M Waqas, Y Niu, Y Li, M Ahmed, D Jin… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Device-to-device (D2D) communication proposes a new epitome in mobile networking to
avail data exchange between physically proximate devices. The exploitation of D2D …

The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges

M Waqas, S Tu, Z Halim, SU Rehman, G Abbas… - Artificial Intelligence …, 2022 - Springer
Security is one of the biggest challenges concerning networks and communications. The
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …

Reinforcement learning assisted impersonation attack detection in device-to-device communications

S Tu, M Waqas, SU Rehman, T Mir… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In device-to-device (D2D) communications, the channel gain between a transmitter and a
receiver is difficult to predict due to channel variations. Hence, an attacker can easily …

A survey of device to device and cooperative communication for the future cellular networks

PK Malik, DS Wadhwa, JS Khinda - International Journal of Wireless …, 2020 - Springer
Abstract Device to Device and Cooperative communication are the two new emerging
technologies in the new era of communication technology which differ from the existing …

A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing

S Tu, M Waqas, F Huang, G Abbas, ZH Abbas - Computer Networks, 2021 - Elsevier
Fog computing is a revolutionary technology for the next generation to bridge the gap
between cloud data centers and end-users. Fog computing is not a counterfeit for cloud …

A survey on socially aware device-to-device communications

M Ahmed, Y Li, M Waqas, M Sheraz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Device-to-device (D2D) communication is continuously evolving and engulfing a wide
diversity of proximate services and applications, which is considered as one of the key …

A survey on 5G coverage improvement techniques: Issues and future challenges

C Sudhamani, M Roslee, JJ Tiang, AU Rehman - Sensors, 2023 - mdpi.com
Fifth generation (5G) is a recent wireless communication technology in mobile networks. The
key parameters of 5G are enhanced coverage, ultra reliable low latency, high data rates …

Device-to-device communication in 5G environment: Issues, solutions, and challenges

MH Adnan, Z Ahmad Zukarnain - Symmetry, 2020 - mdpi.com
Device-to-device (D2D) communication produces a new dimension in the mobile
environment, easing the data exchange process between physically neighboring devices …

Security in fog computing: A novel technique to tackle an impersonation attack

S Tu, M Waqas, SU Rehman, M Aamir… - IEEE …, 2018 - ieeexplore.ieee.org
Fog computing is an encouraging technology in the coming generation to pipeline the
breach between cloud data centers and Internet of Things (IoT) devices. Fog computing is …