Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions

G Chopra, RK Jha, S Jain - Journal of Network and Computer Applications, 2017 - Elsevier
The recent advancements in the field of next generation mobile communication provides
scope to a variety of new areas by connecting various devices through a common platform …

Optimal privacy-preserving probabilistic routing for wireless networks

JY Koh, D Leong, GW Peters, I Nevat… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Privacy-preserving routing protocols in wireless networks frequently utilize additional
artificial traffic to hide the identities of communicating source-destination pairs. Usually, the …

Data compression and transmission techniques in wireless adhoc networks: a review

V Vidhya, M Madheswaran - … and Networking: Proceedings of IC-ICN 2021, 2022 - Springer
A Wireless ad hoc network (WANET) is a decentralized brand where all nodes compete in
routing by promoting data for supplementary nodes. This is arranged in a disaster region to …

Security against passive attacks on network coding system–a survey

Y Liu, Y Morgan - Computer networks, 2018 - Elsevier
Network coding is a progressive information dissemination technology for network
communications. Since its emergence at the turn of the millennium, network coding has …

RETRACTED ARTICLE: Privacy-preserving routing using jointly established protocol in IoT network environment

FZ Zhu, ZY Jiang - EURASIP Journal on Wireless Communications and …, 2023 - Springer
In this paper, network energy assesses the capacity of a node to convey messages to others.
In most cases, network energy is created when two nodes interact with one another. If a …

Probabilistic routing in wireless networks with privacy guarantees

JY Koh, GW Peters, I Nevat, D Leong - Computer Communications, 2020 - Elsevier
We consider the source–destination location privacy problem for routing in wireless
networks. Previous routing schemes mainly provided privacy protection by minimizing the …

Privacy-preserving routing for wireless network using OPERA

S Pavithra, V Sivakumar… - … on Communication and …, 2019 - ieeexplore.ieee.org
In wireless network, a routing protocol named privacy-preserving is used which is used to
cover-up the actual communication-pair by utilizing the additional traffic. The introduction of …

Security and privacy in wireless networking and mobile crowd sensing

YK Jing - 2017 - search.proquest.com
This thesis study and address:(i) the location spoofing attack in time-of-arrival (TOA)-based
localization systems,(ii) the traffic analysis attack in wireless networks, and (iii) privacy …

[引用][C] Ideal Privacy-Preserving Probabilistic Routing for Wireless Networks

RV Pawar, AS Jadhav, NB Huded