On the effect of malicious user on D2D cluster: CSI forgery and countermeasures

I Bang, VAS Manya, J Kim, T Kim - IEEE Access, 2023 - ieeexplore.ieee.org
Device-to-device (D2D) communication in cellular networks refers to a technology that
enables direct transmission and reception between devices in proximity without …

Radio-Frequency Fingerprinting for Distributed IoT Networks: Authentication and QoS Optimization

W Wu, S Hu, D Lin, T Yang - IEEE Systems Journal, 2023 - ieeexplore.ieee.org
With the advance of the Internet of Things (IoT), limited wireless resources cannot meet the
requirements of all users. User authentication can identify the users who are not …

Heuristic algorithm for resource allocation in an internet of battle things

D Lin, W Wu - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
Internet of Things has been experiencing unprecedented deployment from the civilian to the
military ones like the Internet of battle Things (IoBT). Different from the civilian applications …

Servo relays as distributed controllable-mobility network to maintain long-term stable links for mobile robot swarms

HG Zhang, GY Jin, YX Qu, YA Liu - Ad Hoc Networks, 2021 - Elsevier
In the last decade, mobile robot swarms are widely used in wild applications, such as
disaster search and rescue, battlefield communication, and so on. Due to their task-oriented …

Resource allocation in a secure internet of battle vehicles through RF fingerprint recognition

D Lin, W Wu - IEEE Transactions on Vehicular Technology, 2023 - ieeexplore.ieee.org
In the internet of battle vehicles (IoBV), a few unauthorized users may attack and intrude on
a network. The attackers who sneak into the network may maliciously occupy invaluable …

[HTML][HTML] Bluetooth-based device-to-device routing protocol for self-organized mobile-phone mesh network

A Fan, Z Tang, W Wu, Y Tang, D Lin - EURASIP Journal on Wireless …, 2020 - Springer
The bluetooth technology provides a point-to-point communication interface to mobile
phones and other electronic devices, which can be used to form a self-organized ad hoc …

A Price-based D2D Resource Allocation Scheme in Smart Manufacturing Scenarios

S Li, X Zhang, H Liu, W Sun - 2023 - researchsquare.com
Smart Manufacturing has become a popular topic due to the growth of Internet of Things
(IoT) and Cloud Manufacturing, which is driving traditional manufacturing companies to …

A permission‐combination scalable access control model for Internet of things

Q Zhang, Y Li, C Zheng, L Zhu… - Transactions on …, 2022 - Wiley Online Library
Abstract Development of the Internet of things (IoT) is considered as one of the major events
in modern manufacturing industry, and IoT devices are expected to create and exchange …