Securing Data Communication of Internet of Things in 5G Using Network Steganography

[1]  Changting Shi A Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security , 2018 .

[2]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[3]  Khan Muhammad,et al.  Steganography: A Secure way for Transmission in Wireless Sensor Networks , 2015, ArXiv.

[4]  Yuguang Fang,et al.  Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.

[5]  Shaohua Tang,et al.  Attacks and Comments on Several Recently Proposed Key Management Schemes , 2013, IACR Cryptol. ePrint Arch..

[6]  Sabu M. Thampi Information Hiding Techniques: A Tutorial Review , 2008, ArXiv.

[7]  Wei Chen,et al.  Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network , 2019 .

[8]  Wojciech Mazurczyk,et al.  Retransmission steganography and its detection , 2011, Soft Comput..

[9]  Wojciech Mazurczyk,et al.  Principles and overview of network steganography , 2012, IEEE Communications Magazine.

[10]  Baoyu Ma,et al.  A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services , 2019 .

[11]  Wojciech Mazurczyk,et al.  Steganography of VoIP Streams , 2008, OTM Conferences.

[12]  Stephen G. Wilson,et al.  Digital Modulation and Coding , 1995 .

[13]  Abdelbasset Trad,et al.  Performance trade-offs of encryption algorithms for Wireless Sensor Networks , 2014, 2014 World Congress on Computer Applications and Information Systems (WCCAIS).