Incentive Jamming-Based Secure Routing in Decentralized Internet of Things
暂无分享,去创建一个
Tarik Taleb | Xiaohong Jiang | Yulong Shen | Jun Liu | Jia Liu | Yang Xu | Xiaohong Jiang | Yang Xu | Jia Liu | Yulong Shen | Jun Liu | T. Taleb
[1] Heinrich von Stackelberg,et al. Stackelberg (Heinrich von) - The Theory of the Market Economy, translated from the German and with an introduction by Alan T. PEACOCK. , 1953 .
[2] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[3] Roy D. Yates,et al. A Framework for Uplink Power Control in Cellular Radio Systems , 1995, IEEE J. Sel. Areas Commun..
[4] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[5] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[6] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[7] Deep Medhi,et al. Network routing - algorithms, protocols, and architectures , 2007 .
[8] Dina Katabi,et al. Interference alignment and cancellation , 2009, SIGCOMM '09.
[9] Sushil Jajodia,et al. Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation , 2009, IEEE Transactions on Vehicular Technology.
[10] Shuguang Cui,et al. Cooperative Interference Management With MISO Beamforming , 2009, IEEE Transactions on Signal Processing.
[11] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[12] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[13] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[14] Azzedine Boukerche,et al. Routing protocols in ad hoc networks: A survey , 2011, Comput. Networks.
[15] Ming Gu,et al. USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks , 2012, IEEE Transactions on Wireless Communications.
[16] Walid Saad,et al. Tree Formation with Physical Layer Security Considerations in Wireless Multi-Hop Networks , 2012, IEEE Transactions on Wireless Communications.
[17] C.-C. Jay Kuo,et al. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.
[18] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[19] Aylin Yener,et al. Providing Secrecy With Structured Codes: Two-User Gaussian Channels , 2014, IEEE Transactions on Information Theory.
[20] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[21] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[22] Mohsen Guizani,et al. Joint physical-application layer security for wireless multimedia delivery , 2014, IEEE Communications Magazine.
[23] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[24] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[25] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[26] Victor C. M. Leung,et al. Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.
[27] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[28] Ariel Orda,et al. Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers , 2015, IEEE Transactions on Mobile Computing.
[29] Tarik Taleb,et al. Security/QoS-aware route selection in multi-hop wireless ad hoc networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[30] Xiangyun Zhou,et al. Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying , 2016, IEEE Transactions on Communications.
[31] Xiaohong Jiang,et al. SOQR: Secure Optimal QoS Routing in Wireless Ad Hoc Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).
[32] Constantinos Psomas,et al. Impact of Directionality on Interference Mitigation in Full-Duplex Cellular Networks , 2016, IEEE Transactions on Wireless Communications.
[33] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[34] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[35] Fen Zhou,et al. A distributed time-limited multicast algorithm for VANETs using incremental power strategy , 2018, Comput. Networks.
[36] Pinyi Ren,et al. Security-aware routing for artificial-noise-aided multi-hop secondary communications , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).
[37] Hong Wen,et al. Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.
[38] Kurt Binder,et al. Monte Carlo Simulation in Statistical Physics , 1992, Graduate Texts in Physics.
[39] Fatih Kurugollu,et al. Blockchain in Internet-of-Things: Architecture, Applications and Research Directions , 2019, 2019 International Conference on Computer and Information Sciences (ICCIS).
[40] Wan Haslina Hassan,et al. Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.
[41] Furqan Jameel,et al. A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.
[42] Kang G. Shin,et al. Interference Steering to Manage Interference in IoT , 2019, IEEE Internet of Things Journal.
[43] Norio Shiratori,et al. Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks , 2020, IEEE Transactions on Information Forensics and Security.