Robustness, security and privacy in location-based services for future IoT: A survey

L Chen, S Thombre, K Järvinen, ES Lohan… - Ieee …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) connects sensing devices to the Internet for the purpose of
exchanging information. Location information is one of the most crucial pieces of information …

Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure

H Riggs, S Tufail, I Parvez, M Tariq, MA Khan, A Amir… - Sensors, 2023 - mdpi.com
Several critical infrastructures are integrating information technology into their operations,
and as a result, the cyber attack surface extends over a broad range of these infrastructures …

UAV relay in VANETs against smart jamming with reinforcement learning

L Xiao, X Lu, D Xu, Y Tang, L Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Frequency hopping-based antijamming techniques are not always applicable in vehicular
ad hoc networks (VANETs) due to the high mobility of onboard units (OBUs) and the large …

A survey of denial-of-service attacks and solutions in the smart grid

A Huseinović, S Mrdović, K Bicakci, S Uludag - IEEE Access, 2020 - ieeexplore.ieee.org
The scope, scale, and intensity of real, as well as potential attacks, on the Smart Grid have
been increasing and thus gaining more attention. An important component of Smart Grid …

A novel jamming attacks detection approach based on machine learning for wireless communication

Y Arjoune, F Salahdine, MS Islam… - 2020 International …, 2020 - ieeexplore.ieee.org
Jamming attacks target a wireless network creating an unwanted denial of service. 5G is
vulnerable to these attacks despite its resilience prompted by the use of millimeter wave …

Resilience enhancement of multi-agent reinforcement learning-based demand response against adversarial attacks

L Zeng, D Qiu, M Sun - Applied Energy, 2022 - Elsevier
Demand response improves grid security by adjusting the flexibility of consumers
meanwhile maintaining their demand–supply balance in real-time. With the large-scale …

Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks

HAB Salameh, S Almajali, M Ayyash… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The expected widespread usage of Internet-of-Things (IoT) devices and the associated
diversity of applications will place extra pressure on network resources including bandwidth …

Two-dimensional antijamming mobile communication based on reinforcement learning

L Xiao, D Jiang, D Xu, H Zhu, Y Zhang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
By using smart radio devices, a jammer can dynamically change its jamming policy based
on opposing security mechanisms; it can even induce the mobile device to enter a specific …

Covert communication with time uncertainty in time-critical wireless networks

X Lu, S Yan, W Yang, M Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this work, we investigate the status packet covert communication with time uncertainty in
time-critical wireless networks. We model the packet generation as a Poisson process that …

Power systems automation, communication, and information technologies for smart grid: A technical aspects review

V Kulkarni, SK Sahoo, SB Thanikanti… - TELKOMNIKA …, 2021 - telkomnika.uad.ac.id
Smart grid (SG) introduced proven power system, based on modernized power delivery
system with introduction of advanced data-information and communication technologies …