An adaptive energy aware strategy based on game theory to add privacy in the physical layer for cognitive WSNs
暂无分享,去创建一个
[1] Mikael Skoglund,et al. Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks With Secrecy Constraints , 2015, IEEE Wireless Communications Letters.
[2] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[3] Badr Alsamani,et al. A taxonomy of IoT: Security and privacy threats , 2018, 2018 International Conference on Information and Computer Technologies (ICICT).
[4] Peter Langendörfer,et al. Shortening the security parameters in lightweight WSN applications for IoT - lessons learned , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[5] Zhi Xue,et al. Security in MIMO wireless hybrid channel with artificial noise , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).
[6] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[7] Martha Johanna Sepúlveda,et al. Sensing as a Service: Secure Wireless Sensor Network Infrastructure Sharing for the Internet of Things , 2017, Open J. Internet Things.
[8] Mustafa Kocakulak,et al. An overview of Wireless Sensor Networks towards internet of things , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).
[9] Arumugam Nallanathan,et al. Enhancing Secrecy Rate in Cognitive Radio Networks via Multilevel Stackelberg Game , 2016, IEEE Communications Letters.
[10] Javier Blesa,et al. PUE Attack Detection in CWSN Using Collaboration and Learning Behavior , 2013, Int. J. Distributed Sens. Networks.
[11] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[12] Xavier Fernando,et al. Cognitive Wireless Sensor Networks: Emerging topics and recent challenges , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).
[13] Ivana Tomić,et al. A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.
[14] S. Alrabaee,et al. Game Theory for Security in Cognitive Radio Networks , 2012, 2012 International Conference on Advances in Mobile Network, Communication and Its Applications.
[15] Tamer Başar,et al. A game-theoretic view on the physical layer security of cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).
[16] Song Ci,et al. On physical layer security for cognitive radio networks , 2013, IEEE Network.
[17] K. Antonopoulos,et al. Security necessity and its impact on smart cities' wireless sensor networks , 2017, 2017 South Eastern European Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM).
[18] Yueming Cai,et al. Energy-efficient optimization for physical layer security in large-scale random CRNs , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[19] Doaa Alrababah,et al. A Survey: Authentication Protocols for Wireless Sensor Network in the Internet of Things; Keys and Attacks , 2017, 2017 International Conference on New Trends in Computing Sciences (ICTCS).
[20] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[21] Meikang Qiu,et al. Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.