Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey

H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …

Unmanned aerial vehicle for internet of everything: Opportunities and challenges

Y Liu, HN Dai, Q Wang, MK Shukla, M Imran - Computer communications, 2020 - Elsevier
The recent advances in information and communication technology (ICT) have further
extended Internet of Things (IoT) from the sole “things” aspect to the omnipotent role of …

Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML

RU Rasool, HF Ahmad, W Rafique, A Qayyum… - Journal of Network and …, 2022 - Elsevier
Abstract Internet of Medical Things (IoMT) supports traditional healthcare systems by
providing enhanced scalability, efficiency, reliability, and accuracy of healthcare services. It …

Multi-authority attribute-based keyword search over encrypted cloud data

Y Miao, RH Deng, X Liu, KKR Choo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …

Achieving privacy-preserving DSSE for intelligent IoT healthcare system

Y Liu, J Yu, J Fan, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As the product of combining Internet of Things (IoT), cloud computing, and traditional
healthcare, Intelligent IoT Healthcare (IIoTH) brings us a lot of convenience, meanwhile …

A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks

B Chen, L Wu, H Wang, L Zhou… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As the integration of the Internet of Vehicles and social networks, vehicular social networks
(VSN) not only improves the efficiency and reliability of vehicular communication …

Lightweight privacy-preserving medical diagnosis in edge computing

Z Ma, J Ma, Y Miao, X Liu, KKR Choo… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
With the development of machine learning, it is popular that mobile users can submit
individual symptoms at any time anywhere for medical diagnosis. Edge computing is …

Covert wireless communication in IoT network: From AWGN channel to THz band

Z Liu, J Liu, Y Zeng, J Ma - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Covert communication can prevent an adversary from knowing that a transmission has
occurred between two users. In this article, we consider covert wireless communications in …

Multi-keyword searchable and verifiable attribute-based encryption over cloud data

Y Zhang, T Zhu, R Guo, S Xu, H Cui… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In cloud data sharing systems, Searchable Encryption (SE) schemes ensure data
confidentiality with retrieving, but it faces several issues in practice. First, most of the …

An intelligent and trust UAV-assisted code dissemination 5G system for industrial internet-of-things

J Liang, W Liu, NN Xiong, A Liu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
A large number of devices with communication and sensing capabilities are connected to
the 5G network and facilitate distributed industrial Internet of Things (IIoT) applications …