Filters








885 Hits in 8.3 sec

A survey on security issues in cognitive radio based cooperative sensing

Shivanshu Shrivastava, A. Rajesh, P. K. Bora, Bin Chen, Mingjun Dai, Xiaohui Lin, Hui Wang
2021 IET Communications  
Then a categorization of the defence mechanisms for defending both the attacks has been proposed as active and passive.  ...  Active mechanisms are suitable for an immediate defence in a limited time span, while passive mechanisms are suitable for flexible CSS systems that are ready to detect the attacks over a period of time  ...  In [93] , a dynamic secure routing game framework to effectively combat jamming attacks in distributed cognitive radio networks has been proposed.  ... 
doi:10.1049/cmu2.12131 fatcat:ivw2dsepevfi5izquylly65jg4

A Survey on Recent Advanced Research of CPS Security

Zhenhua Wang, Wei Xie, Baosheng Wang, Jing Tao, Enze Wang
2021 Applied Sciences  
Malicious attacks on CPSs can lead to both property damage and casualties. Therefore, it is worth surveying CPS security by reviewing and analyzing the latest high-quality related works.  ...  Finally, we also perform a statistical analysis in terms of paper publication times, author institutes, countries, and sponsors to show the current worldwide CPS security research situation.  ...  To defend against this kind of attack, they proposed a monitoring scheme that leverages radio frequency [10] to observe a power grid's status.  ... 
doi:10.3390/app11093751 fatcat:fxby2wjzpnchrfshvilxalmptm

Recent Advancements in Intrusion Detection Systems for the Internet of Things

Zeeshan Ali Khan, Peter Herrmann
2019 Security and Communication Networks  
Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks.  ...  Besides looking on approaches developed particularly for IoT, we introduce also work for the three similar network types mentioned above and discuss if they are also suitable for IoT systems.  ...  The goal of the game is to determine the weakest node in the network and thereafter to propose strategies to defend it against malicious attacks.  ... 
doi:10.1155/2019/4301409 fatcat:qupk6elzcvbkrarqf25epmjdci

Olympus: Sensor Privacy through Utility Aware Obfuscation

Nisarg Raval, Ashwin Machanavajjhala, Jerry Pan
2019 Proceedings on Privacy Enhancing Technologies  
We present Olympus, a privacy framework that limits the risk of disclosing private user information by obfuscating sensor data while minimally affecting the functionality the data are intended for.  ...  Personal data garnered from various sensors are often offloaded by applications to the cloud for analytics. This leads to a potential risk of disclosing private user information.  ...  Thus, the learned obfuscation defends against a specific attacker, namely the pretrained Estimator.  ... 
doi:10.2478/popets-2019-0002 dblp:journals/popets/RavalMP19 fatcat:xpezsfu7izbrli6evpoxyty4tm

The Confluence of Networks, Games and Learning [article]

Tao Li, Guanze Peng, Quanyan Zhu, Tamer Basar
2021 arXiv   pre-print
This paper articulates the confluence of networks, games and learning, which establishes a theoretical underpinning for understanding multi-agent decision-making over networks.  ...  We provide an selective overview of game-theoretic learning algorithms within the framework of stochastic approximation theory, and associated applications in some representative contexts of modern network  ...  To address these issues, [113] provides a learning-based secure scheme, which allows the network to defend against unknown attacks with minimum level of deterioration in performance.  ... 
arXiv:2105.08158v1 fatcat:lgclhfg4drbpfix5qoarmnktf4

Foreword of Special Issue on "Nomadic Services and Applications"

Jason C. Hung
2011 Journal of Networks  
Liu, “A game theoretic [1] C. Diot, B. N. Levine, B. lyles, H. Kassem, and D.  ...  Agrawal, and S.Suri, “A game-theoretic framework for incentives in P2P systems,” in Proc.  ... 
doi:10.4304/jnw.6.5.687-688 fatcat:3qws6kqycnffxnh6n6th6ioc5a

Deep Neural Mobile Networking [article]

Chaoyun Zhang
2020 arXiv   pre-print
This thesis attacks important problems in the mobile networking area from various perspectives by harnessing recent advances in deep neural networks.  ...  This makes monitoring and managing the multitude of network elements intractable with existing tools and impractical for traditional machine learning algorithms that rely on hand-crafted feature engineering  ...  Summary In this chapter, we introduced TIKI-TAKA, a framework for defending against adversarial attacks on deep learning based NIDS.  ... 
arXiv:2011.05267v1 fatcat:yz2zp5hplzfy7h5kptmho7mbhe

2020 Index IEEE Internet of Things Journal Vol. 7

2020 IEEE Internet of Things Journal  
., Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT; JIoT July 2020 6550-6565 Jamalipour, A., see Murali, S., JIoT Jan. 2020 379-388 James, L.A., see Wanasinghe, T.R.,  ...  ., +, JIoT July 2020 6392-6401 Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing.  ...  Asheralieva, A., +, JIoT March 2020 1974-1993 Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing.  ... 
doi:10.1109/jiot.2020.3046055 fatcat:wpyblbhkrbcyxpnajhiz5pj74a

A Survey on DDoS Attack and Defense Strategies: From Traditional Schemes to Current Techniques

Muhammad AAMIR, Mustafa Ali ZAIDI
2013 Interdisciplinary Information Sciences  
In this way, resources are reserved against such attack traffic to deny or degrade the services for legitimate users.  ...  The attack employs client server technology and a stream of data packets is sent to the victim for exhausting its services, connections, bandwidth etc.  ...  A game theoretic approach is used in [102] to offer defense against DoS/DDoS cyber attacks. The DDoS attack is modeled as a one-shot & zero-sum game with non-cooperation.  ... 
doi:10.4036/iis.2013.173 fatcat:pgvcutvfajejpmgatezon5ftdq

2021 Index IEEE Internet of Things Journal Vol. 8

2021 IEEE Internet of Things Journal  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  ., +, JIoT Oct. 1, 2021 14623-14637 EyeLoc: Smartphone Vision-Enabled Plug-n-Play Indoor Localization in Large Shopping Malls.  ...  ., +, JIoT Aug. 15, 2021 12734-12747 EyeLoc: Smartphone Vision-Enabled Plug-n-Play Indoor Localization in Large Shopping Malls.  ... 
doi:10.1109/jiot.2022.3141840 fatcat:42a2qzt4jnbwxihxp6rzosha3y

Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges [article]

Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro
2020 arXiv   pre-print
We explore the vulnerabilities of EH networks, and we provide a comprehensive overview of the scientific literature, including attack vectors, cryptography techniques, physical-layer security schemes for  ...  For each of the identified macro-areas, we compare the scientific contributions across a range of shared features, indicating the pros and cons of the described techniques, the research challenges, and  ...  ACKNOWLEDGEMENTS The authors would like to thank the anonymous reviewers for their comments and suggestions, that helped improving the quality of the manuscript.  ... 
arXiv:2004.10394v2 fatcat:o4iwqkcdvfgmtjmwmxgvrbt3je

Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network [article]

Abdullahi Isah
2015 Ph.d.-serien for Det Teknisk-Naturvidenskabelige Fakultet, Aalborg Universitet  
The Socio-technical theory was used as a theoretical framework for this research.  ...  Theoretical Framing -The Socio-technical Theory (STS) Socio-technical theory has proven to be a useful theoretical framework in blending people with technology for addressing organizational problems; or  ... 
doi:10.5278/vbn.phd.engsci.00017 fatcat:dqz324xtjbgy3jjyameuc2z3ii

Cost Benefits of Using Machine Learning Features in NIDS for Cyber Security in UK Small Medium Enterprises (SME)

Nisha Rawindaran, Ambikesh Jayal, Edmond Prakash, Chaminda Hewage
2021 Future Internet  
in the office, in terms of their credibility in handling zero-day attacks against the costs of achieving so.  ...  A cost model was used to compare the outcome of SMEs' decision making, in getting the right framework in place in securing their data.  ...  Therefore, it is crucial for SMEs to also understand how Machine Learning plays an important role in the detection of zero-day attacks. However, this does come with a cost.  ... 
doi:10.3390/fi13080186 fatcat:jyggowbzurcdrezu5jhr3g5okm

Cyber-Physical Systems Security: Limitations, Issues and Future Trends

Jean-Paul A. Yaacoub, Ola Salman, Hassan N. Noura, Nesrine Kaaniche, Ali Chehab, Mohamad Malli
2020 Microprocessors and microsystems  
Moreover, CPS security vulnerabilities, threats and attacks are reviewed, while the key issues and challenges are identified.  ...  Their integration with IoT led to a new CPS aspect, the Internet of Cyber-Physical Things (IoCPT).  ...  In fact, AI is now being consid-ered as a game-changing solution against a variety of cyberphysical attacks targeting CPS systems, devices and communication points.  ... 
doi:10.1016/j.micpro.2020.103201 pmid:32834204 pmcid:PMC7340599 fatcat:omeihta4vbe55cohyhbhi56mzm

AI and ML – Enablers for Beyond 5G Networks

Alexandros Kaloxylos, Anastasius Gavras, Daniel Camps Mur, Mir Ghoraishi, Halid Hrasnica
2020 Zenodo  
Reinforcement learning is concerned about how intelligent agents must take actions in order to maximize a collective reward, e.g. to improve a property of the system.  ...  In network planning, attention is given to the network element placement problem and to dimensioning considerations for C-RAN clusters.  ...  For this purpose, OptSFC will model the state of the network using an incomplete information Markov game, as the defender does not know directly what the attacker is doing, but can perceive it through  ... 
doi:10.5281/zenodo.4299895 fatcat:ngzbopfm6bb43lnrmep6nz5icm
« Previous Showing results 1 — 15 out of 885 results