Steganography in modern smartphones and mitigation techniques

W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …

A survey on energy-aware security mechanisms

A Merlo, M Migliardi, L Caviglione - Pervasive and Mobile Computing, 2015 - Elsevier
The increasing adoption of mobile devices as the preferred tool to access the Internet
imposes to deepen the investigation of security aspects. In parallel, their power constrained …

Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence

L Caviglione, M Gaggero, JF Lalande… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Modern malware uses advanced techniques to hide from static and dynamic analysis tools.
To achieve stealthiness when attacking a mobile device, an effective approach is the use of …

A survey on non-linear optimization problems in wireless sensor networks

R Asorey-Cacheda, AJ Garcia-Sanchez… - Journal of Network and …, 2017 - Elsevier
Abstract Wireless Sensor Networks (WSN) pose several problems in terms of scalability and
energy consumption. Many of them have been treated in the literature by means of …

Offloading-assisted energy-balanced IoT edge node relocation for confident information coverage

M Wang, L Zhu, LT Yang, M Lin… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The promising Industrial Internet of Things (IIoT) consisting of heterogeneous resource-
restricted IoT nodes recently has attracted great attention from both academia and industry …

[HTML][HTML] Channel characteristic aware privacy protection mechanism in WBAN

P Zhang, J Ma - Sensors, 2018 - mdpi.com
Advances of information and communication technologies in medical areas have led to the
emergence of wireless body area network (WBAN). The high accessibility of media in WBAN …

Countering adaptive network covert communication with dynamic wardens

W Mazurczyk, S Wendzel, M Chourib, J Keller - Future Generation …, 2019 - Elsevier
Network covert channels are hidden communication channels in computer networks. They
influence several factors of the cybersecurity economy. For instance, by improving the …

Energy-efficient computation offloading for UAV-assisted MEC: A two-stage optimization scheme

W Lin, T Huang, X Li, F Shi, X Wang… - ACM Transactions on …, 2021 - dl.acm.org
In addition to the stationary mobile edge computing (MEC) servers, a few MEC surrogates
that possess a certain mobility and computation capacity, eg, flying unmanned aerial …

WiFi physical layer stays awake and responds when it should not

A Abedi, H Lu, A Chen, C Liu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
WiFi communication should be possible only between devices inside the same network.
However, we find that all existing WiFi devices send back acknowledgments (ACKs) to even …

Intrusion detection system for IoT heterogeneous perceptual network

M Zhou, L Han, H Lu, C Fu - Mobile networks and applications, 2021 - Springer
With the acceleration of the Internet of things (IoT) construction, the security and energy
consumption of IoT will become an import factor restricting the overall development of the …