A survey of security in cloud, edge, and fog computing

A Ometov, OL Molua, M Komarov, J Nurmi - Sensors, 2022 - mdpi.com
The field of information security and privacy is currently attracting a lot of research interest.
Simultaneously, different computing paradigms from Cloud computing to Edge computing …

Future generation communications with game strategies: A comprehensive survey

R Gupta, J Gupta - Computer Communications, 2022 - Elsevier
For an effective, low latency, and ultra reliable pervasive connectivity among next-
generation wireless networks such as Internet of Things (IoT) devices, machine-to-machine …

AoI optimization in the UAV-aided traffic monitoring network under attack: A stackelberg game viewpoint

Y Yang, W Wang, L Liu, K Dev… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Intelligent Vehicle Systems (IVSs) devote to integrating the data sensing, processing, and
transmission in the Vehicle to Everything (V2X) scenarios, where the Unnamed Aircraft …

A novel efficient MAKA protocol with desynchronization for anonymous roaming service in global mobility networks

G Xu, J Liu, Y Lu, X Zeng, Y Zhang, X Li - Journal of Network and Computer …, 2018 - Elsevier
In the roaming service system of Global Mobile Networks (GLOMONET), mutual
authentication and key agreement (MAKA) protocol is used to identify legitimate roaming …

A secure multiuser privacy technique for wireless IoT networks using stochastic privacy optimization

JH Anajemba, T Yue, C Iwendi… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
With the exponential increase of interconnected communicating devices which make up the
Internet of Things (IoT), securing the network transmission and the fifth generation (5G) …

Jamming and eavesdropping defense in green cyber–physical transportation systems using a Stackelberg game

K Wang, L Yuan, T Miyazaki, Y Chen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper studies the secure transmission rate issue between sensors and the remote
controller to defend the jamming and eavesdropping attacks in green cyber-physical …

Jamming-assisted eavesdropping over parallel fading channels

Y Han, L Duan, R Zhang - IEEE transactions on information …, 2019 - ieeexplore.ieee.org
Unlike passive eavesdropping, proactive eavesdropping is recently proposed to use
jamming to moderate a suspicious link's communication rate for facilitating simultaneous …

Secure transmission in satellite-UAV integrated system against eavesdropping and jamming: A two-level stackelberg game model

C Liao, K Xu, H Zhu, X Xia, Q Su… - China …, 2022 - ieeexplore.ieee.org
Aiming at the physical layer security (PLS) secure transmission existing in the information
backhaul link of the satellite-UAV integrated (SUI) network, a two-layer Stackelberg game …

Secrecy rate maximization in virtual-MIMO enabled SWIPT for 5G centric IoT applications

A Jaiswal, S Kumar, O Kaiwartya, N Kumar… - IEEE Systems …, 2020 - ieeexplore.ieee.org
In 5G centric sensors-enabled Internet of Things (IoT) applications, virtual multiple-input
multiple-output (V-MIMO) technique has witnessed significant attention as physical layer …

A UAV-assisted secure communication system by jointly optimizing transmit power and trajectory in the internet of things

W Tian, X Ding, G Liu, Y Dai… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Secure communication technology has attracted more and more attention to improve the
security of the Internet of Things (IoT). In this article, we discuss the maximum secrecy …