Incentive jamming-based secure routing in decentralized internet of things

Y Xu, J Liu, Y Shen, J Liu, X Jiang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
This article focuses on the secure routing problem in the decentralized Internet of Things
(IoT). We consider a typical decentralized IoT scenario composed of peer legitimate devices …

QoS-aware secure routing design for wireless networks with selfish jammers

Y Xu, J Liu, Y Shen, X Jiang, Y Ji… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper focuses on the QoS-aware secure routing design based on the physical layer
security technology for a multi-hop wireless network consisting of legitimate nodes …

Data compression and transmission techniques in wireless adhoc networks: a review

V Vidhya, M Madheswaran - … and Networking: Proceedings of IC-ICN 2021, 2022 - Springer
A Wireless ad hoc network (WANET) is a decentralized brand where all nodes compete in
routing by promoting data for supplementary nodes. This is arranged in a disaster region to …

Physical-layer security in full-duplex multi-hop multi-user wireless network with relay selection

S Atapattu, N Ross, Y Jing, Y He… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper investigates the relay selection (RS) problem for multi-hop full-duplex relay
networks where multiple source-destination (SD) pairs compete for the same pool of relays …

An intelligent AODV routing with energy efficient weight based clustering algorithm (EEWCA) in wireless Ad hoc network (WANET)

S Tamizharasu, P Kalpana - Wireless Networks, 2023 - Springer
Abstract Wireless Ad hoc networks (WANETs) and Mobile Ad hoc networks are
infrastructures less network structures made of energy-constrained nodes. These networks …

An adaptive secure and efficient routing protocol for mobile ad hoc networks

BK Tripathy, SK Jena, P Bera, S Das - Wireless Personal Communications, 2020 - Springer
The rapidly emerging wireless service requirements and deployment demands over last few
decades necessitates the application of Mobile Ad hoc Networks in many areas. These …

A distributed publisher-driven secure data sharing scheme for information-centric IoT

R Li, H Asaeda, J Li - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
In Information-Centric Internet of Things (ICIoT), Internet of Things (IoT) data can be cached
throughout a network for close data copy retrievals. Such a distributed data caching …

Link selection for security-QoS tradeoffs in buffer-aided relaying networks

J He, J Liu, Y Shen, X Jiang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This article investigates the secure communication in a two-hop cooperative wireless
network, where a buffer-aided relay helps forward data from the source to destination, and a …

Physical layer security-aware routing and performance tradeoffs in ad hoc networks

Y Xu, J Liu, Y Shen, X Jiang, N Shiratori - Computer Networks, 2017 - Elsevier
The application of physical layer security in ad hoc networks has attracted considerable
academic attention recently. However, the available studies mainly focus on the single-hop …

Multi-hop MIMO relaying based on simultaneous wireless information and power transfer

KB Ofori-Amanfo, DKP Asiedu, RK Ahiadormey… - IEEE …, 2021 - ieeexplore.ieee.org
This paper studies a multiple-input and multiple-output (MIMO) multi-hop decode-and-
forward (DF) relaying wireless network. Communication between a source node and a …