QoS-aware secure routing design for wireless networks with selfish jammers

Y Xu, J Liu, Y Shen, X Jiang, Y Ji… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper focuses on the QoS-aware secure routing design based on the physical layer
security technology for a multi-hop wireless network consisting of legitimate nodes …

Efficient wireless security through jamming, coding and routing

M Ghaderi, D Goeckel, A Orda… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
There is a rich recent literature on how to assist secure communication between a single
transmitter and receiver at the physical layer of wireless networks through techniques such …

Secure routing with power optimization for ad-hoc networks

HM Wang, Y Zhang, DWK Ng… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we consider the problem of joint secure routing and transmit power
optimization for a multi-hop ad-hoc network under the existence of randomly distributed …

Incentive jamming-based secure routing in decentralized internet of things

Y Xu, J Liu, Y Shen, J Liu, X Jiang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
This article focuses on the secure routing problem in the decentralized Internet of Things
(IoT). We consider a typical decentralized IoT scenario composed of peer legitimate devices …

A secure trusted multipath routing and optimal fuzzy logic for enhancing QoS in MANETs

M Rajashanthi, K Valarmathi - Wireless Personal Communications, 2020 - Springer
Abstract Wireless Mobile Ad Hoc Network (MANET) is an independentmethod of mobile
nodes. The multipath routing in MANET is the most important pertains for securable …

A trustworthiness-based QoS routing protocol for wireless ad hoc networks

M Yu, KK Leung - IEEE Transactions on wireless …, 2009 - ieeexplore.ieee.org
Due to the fact that the wireless links in an ad hoc network are susceptible to attacks and the
nodal mobility renders the network to have a highly dynamic topology, it becomes critical to …

Energy-efficient routing in wireless networks in the presence of jamming

A Sheikholeslami, M Ghaderi… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
The effectiveness and the simple implementation of physical layer jammers make them an
essential threat for wireless networks. In a multihop wireless network, where jammers can …

[PDF][PDF] On multipath routing in multihop wireless networks: security, performance, and their tradeoff

L Chen, J Leneutre - Eurasip journal on wireless communications and …, 2009 - Springer
Routing amid malicious attackers in multihop wireless networks with unreliable links is a
challenging task. In this paper, we address the fundamental problem of how to choose …

QoS and jamming-aware wireless networking using deep reinforcement learning

N Abuzainab, T Erpek, K Davaslioglu… - MILCOM 2019-2019 …, 2019 - ieeexplore.ieee.org
The problem of quality of service (QoS) and jamming-aware communications is considered
in an adversarial wireless network subject to external eavesdropping and jamming attacks …

Securing wireless transmission against reactive jamming: A Stackelberg game framework

X Tang, P Ren, Y Wang, Q Du… - 2015 IEEE global …, 2015 - ieeexplore.ieee.org
Reactive jamming, which performs jamming attacks on condition of detecting the legitimate
transmissions, is widely considered as one of the most serious security challenges in …