Incentive jamming-based secure routing in decentralized internet of things

Y Xu, J Liu, Y Shen, J Liu, X Jiang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
This article focuses on the secure routing problem in the decentralized Internet of Things
(IoT). We consider a typical decentralized IoT scenario composed of peer legitimate devices …

QoS-aware secure routing design for wireless networks with selfish jammers

Y Xu, J Liu, Y Shen, X Jiang, Y Ji… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper focuses on the QoS-aware secure routing design based on the physical layer
security technology for a multi-hop wireless network consisting of legitimate nodes …

Jamming in the internet of things: A game-theoretic perspective

N Namvar, W Saad, N Bahadori… - 2016 IEEE Global …, 2016 - ieeexplore.ieee.org
Due to its scale and largely interconnected nature, the Internet of Things (IoT) will be
vulnerable to a number of security threats that range from physical layer attacks to network …

Jamming mitigation via hierarchical security game for IoT communications

X Tang, P Ren, Z Han - IEEE Access, 2018 - ieeexplore.ieee.org
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly
launch jamming attacks only when it detects the legitimate transmission, known as the …

Towards a light weight routing security in IoT using non-cooperative game models and Dempster–Shaffer theory

V Kiran, S Rani, P Singh - Wireless Personal Communications, 2020 - Springer
The internet of things (IoT) has become an emerging technology owing to the rapidly
increasing number of devices and their connectivity to the internet. Routing protocol for low …

A cross-layer cooperative jamming scheme for social internet of things

Y Huo, J Fan, Y Wen, R Li - Tsinghua Science and Technology, 2021 - ieeexplore.ieee.org
In this paper, we design a friendly jammer selection scheme for the social Internet of Things
(IoT). A typical social IoT is composed of a cellular network with underlaying Device-to …

Deceptive attack and defense game in honeypot-enabled networks for the internet of things

QD La, TQS Quek, J Lee, S Jin… - IEEE Internet of Things …, 2016 - ieeexplore.ieee.org
In modern days, breakthroughs in information and communications technologies lead to
more and more devices of every imaginable type being connected to the Internet. This also …

Constrained random routing mechanism for source privacy protection in WSNs

W Chen, M Zhang, G Hu, X Tang, AK Sangaiah - IEEE Access, 2017 - ieeexplore.ieee.org
In wireless sensor networks, it is a typical threat to source privacy that an attacker performs
backtracing strategy to locate source nodes by analyzing transmission paths. With the …

A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things

Y He, G Han, H Wang, JA Ansere, W Zhang - Future Generation Computer …, 2019 - Elsevier
With the development of the Internet of Things (IoT), Smart Data, which effectively support
the IoT for planning, operation, monitoring, control, and intelligent decision making, has …

Pareto optimal security resource allocation for Internet of Things

A Rullo, D Midi, E Serra, E Bertino - ACM Transactions on Privacy and …, 2017 - dl.acm.org
In many Internet of Thing (IoT) application domains security is a critical requirement,
because malicious parties can undermine the effectiveness of IoT-based systems by …