Filters








38 Hits in 6.3 sec

Towards Secure Wireless Mesh Networks for UAV Swarm Connectivity: Current Threats, Research, and Opportunities [article]

Martin Andreoni Lopez, Michael Baddeley, Willian T. Lunardi, Anshul Pandey, Jean-Pierre Giacalone
2021 arXiv   pre-print
While wireless mesh networks are envisioned as a solution for such scenarios, these networks come with their own challenges and security vulnerabilities.  ...  In this paper, we analyze the key security and resilience issues resulting from the application of wireless mesh networks within UAV swarms.  ...  PASER is a position-aware routing protocol specifically focused on UAV wireless mesh networks [13] .  ... 
arXiv:2108.13154v1 fatcat:oc2ibkaeaveyto4n33cenr3c7u

Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey

Mohamed Abdalzaher, Karim Seddik, Maha Elsabrouty, Osamu Muta, Hiroshi Furukawa, Adel Abdel-Rahman
2016 Sensors  
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes.  ...  In [28] , the authors discuss the promising features of game theory approaches for the wireless networks, while in [29, 30] , different trends of using game theory for WSNs have been reviewed.  ...  and network operators are responsible for the QoS and spectrum management, respectively.  ... 
doi:10.3390/s16071003 pmid:27367700 pmcid:PMC4970053 fatcat:3utgdvzzdvhpjnvvsaweywmyvm

Table of contents

2021 IEEE Transactions on Wireless Communications  
Xiangming Cai, Weikai Xu, Lin Wang, and Guanrong Chen QoS-Aware Secure Routing Design for Wireless Networks With Selfish Jammers ......................................... ..............................  ...  Goldsmith Gradient Statistics Aware Power Control for Over-the-Air Federated Learning .........  ... 
doi:10.1109/twc.2021.3094369 fatcat:5vtsl4bynjeczccctefkwlzoiq

Game Theoretic Approaches in Vehicular Networks: A Survey [article]

Zemin Sun, Yanheng Liu, Jian Wang, Carie Anil, Dongpu Cao
2020 arXiv   pre-print
Game theory, a theoretical framework designed for strategic interactions among rational decision-makers who faced with scarce resources, can be used to model and analyze individual or group behaviors of  ...  However, as the number of connected nodes keeps increasing, it is challenging to satisfy various and large amounts of service requests with different Quality of Service (QoS ) and security requirements  ...  : GT has been widely applied for mitigating selfish behaviors of packet forwarding in wireless networks.  ... 
arXiv:2006.00992v1 fatcat:lljjlitvlvbvhbg3aot5xszefm

2012 TMC Annual Index

2013 IEEE Transactions on Mobile Computing  
Xu, Dan, +, TMC Aug. 2012 1372-1385 Leveraging the Algebraic Connectivity of a Cognitive Network for Routing Design.  ...  Choi, Jae-Ho, +, TMC Feb. 2012 278-291 Leveraging the Algebraic Connectivity of a Cognitive Network for Routing Design.  ... 
doi:10.1109/tmc.2013.1 fatcat:qp57tpkfx5gbrc3dvtetebm3ui

Security: A Core Issue in Mobile Ad hoc Networks

Asif Shabbir, Fayyaz Khalid, Syed Muqsit Shaheed, Jalil Abbas, M. Zia-Ul-Haq
2015 Journal of Computer and Communications  
The Mobile Ad hoc Networks (MANETs) are optimal choice to accommodate this growing trend but there is a problem, security is the core issue. MANETs rely on wireless links for communication.  ...  Wireless networks are considered more exposed to security attacks as compared to wired networks, especially; MANETs are the soft target due to vulnerable in nature.  ...  Acknowledgements I, personally feel extremely beholden to Prof(R) Ghulam Qasim Shah who with self-abnegation graciously spared his time and reviewed this paper.  ... 
doi:10.4236/jcc.2015.312005 fatcat:oaovaaafp5bnfihxgxlcww6os4

Applications of Economic and Pricing Models for Wireless Network Security: A Survey [article]

Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Zhu Han
2017 arXiv   pre-print
Unlike wireline networks, the broadcast nature and the highly dynamic change of network environments pose a number of nontrivial challenges to security design in wireless networks.  ...  in wireless networks.  ...  Wireless networks play an extremely important role in many applications. However, security for wireless networks remains a big challenge.  ... 
arXiv:1707.07846v1 fatcat:xb3jvolwmjad7oxdefdd2pq7dq

Cognitive Radio for Smart Grids: Survey of Architectures, Spectrum Sensing Mechanisms, and Networking Protocols

Athar Ali Khan, Mubashir Husain Rehmani, Martin Reisslein
2016 IEEE Communications Surveys and Tutorials  
Cognitive radio networks (CRNs) in particular are highly promising for providing timely SG wireless communications by utilizing all available spectrum resources.  ...  We furthermore present open issues and research challenges faced by CR-based SG networks along with future directions.  ...  Spectrum-aware multichannel routing algorithms should be designed to improve the efficiency of spectrum usage with minimum event-to-sink delays.  ... 
doi:10.1109/comst.2015.2481722 fatcat:rnchxiumhndqho5tlumonfdoxi

2014 Index IEEE Transactions on Parallel and Distributed Systems Vol. 25

2015 IEEE Transactions on Parallel and Distributed Systems  
Sun, W., +, TPDS Nov. 2014 3025-3035 Truthful QoS-Aware Spectrum Auction with Spatial Reuse for Large-Scale Networks.  ...  Tang, Shaojie, +, TPDS Jan. 2014 2-11 A Truthful QoS-Aware Spectrum Auction with Spatial Reuse for Large- Scale Networks.  ...  ., +, TPDS Aug. 2014 2840 -2850 Energy and Network Aware Workload Management for Sustainable Data Centers with Thermal Storage. 2030 -2042 Hyperbolic Utilization Bounds for Rate Monotonic Scheduling  ... 
doi:10.1109/tpds.2014.2371591 fatcat:qxyljogalrbfficryqjowgv3je

A layered approach to cognitive radio network security: A survey

Deanna Hlavacek, J. Morris Chang
2014 Computer Networks  
With the realization of cognitive radio networks came the recognition that both new and old security threats are relevant.  ...  The cognitive radio network is still vulnerable to many of the denial of service, wormhole, routing, and jamming attacks that plague other wireless technologies.  ...  Additionally, countermeasures to the insider attack can be adopted from wireless sensor network studies, such as the security aware ad hoc routing protocol (SAR).  ... 
doi:10.1016/j.comnet.2014.10.001 fatcat:eo4kskzcbzdvfap7srpsdhxkpy

The future of security in Wireless Multimedia Sensor Networks

Manel Guerrero-Zapata, Ruken Zilan, José M. Barceló-Ordinas, Kemal Bicakci, Bulent Tavli
2009 Telecommunications Systems  
This is a position paper on our views on security aspects of Wireless Multimedia Sensor Networks (Secure WMSNs). It is meant to serve as a brief survey.  ...  ASAR: an Antbased Service Aware Routing algorithm for multimedia sensor networks. Frontiers of Electrical and Electronic Engineering in China, 3(1), 25-33. 15.  ...  Ant-based Service Aware Routing (ASAR) [14] chooses paths according to QoS requirements and defines three types of services: Event-driven services, data query-driven services and stream query-driven  ... 
doi:10.1007/s11235-009-9235-0 fatcat:rcwslfkznvhcdcxe5ngn4upvfy

An Investigative Survey of different Security Attacks in MANETs

Naresh Dobhal, Devashish Pundir
2015 International Journal of Computer Applications  
Conventional security policies and mechanisms designed for wired networks are mostly considered inadequate and ineffective for these highly dynamic and resource-constrained Adhoc networks.  ...  To design and develop security models for MANETs we must first be intriguing about the possible security attacks that may pounce upon different adhoc network scenarios.  ...  Proper security policies & measures should be considered or designed taking in consideration the features & applications of mobile adhoc networks.  ... 
doi:10.5120/ijca2015905977 fatcat:gd653ytjkfewrdbu6ydkmvlpj4

Categorized Security Threats in the Wireless Sensor Networks: Countermeasures and Security Management Schemes

Ulya Sabeel, Saima Maqbool
2013 International Journal of Computer Applications  
You will get a general introduction about wireless sensor networks in section I, section II explains the need for security in Wireless sensor networks, section III gives security challenges followed by  ...  section IV &V that give security and survivability requirements for a Wireless sensor network which follows attack categorization in section VI, followed by the security management schemes in section  ...  Protocols, including security mechanisms designed for the WSN, should be energy aware and efficient.  ... 
doi:10.5120/10718-5262 fatcat:6ep6stzssbb6hnqfpitldoytgi

5G device-to-device communication security and multipath routing solutions

Aslihan Celik, Jessica Tetzner, Koushik Sinha, John Matta
2019 Applied Network Science  
This paper presents a survey of the literature on security problems relating to D2D communications in mobile 5G networks.  ...  millions of existing devices without adequate built-in security, as well as new devices whose extreme computing power will make them attractive targets for hackers.  ...  Secure multipath routing related work Use of mutipath routing for secure and reliable transmission of data has been extensively studied in the context of wireless sensor networks and multipath TCP (MPTCP  ... 
doi:10.1007/s41109-019-0220-6 fatcat:cmlbcimy5bhs7af46bqaz7g2mm

When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges

Qun Wang, Haijian Sun, Rose Qingyang Hu, Arupjyoti Bhuyan
2022 IEEE Open Journal of the Communications Society  
This comprehensive review is intended to provide the foundation for and facilitate future studies on exploring the potential of emerging ML for coping with increasingly complex SS and their security problems  ...  In particular, we elaborate the state-of-the-art methodologies for improving the performance of SS communication systems for various vital aspects, including ML based cognitive radio networks (CRNs), ML  ...  To enable the cellular network to use LTE-U with CA to meet the QoS needs of its users while protecting Wi-Fi Access Points (WAPs) for a network with multiple operators, the problem of LTE-U sum-rate maximization  ... 
doi:10.1109/ojcoms.2022.3146364 fatcat:ffx3xbq5qzb6hcserskljb4o7u
« Previous Showing results 1 — 15 out of 38 results