A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Towards Secure Wireless Mesh Networks for UAV Swarm Connectivity: Current Threats, Research, and Opportunities
[article]
2021
arXiv
pre-print
While wireless mesh networks are envisioned as a solution for such scenarios, these networks come with their own challenges and security vulnerabilities. ...
In this paper, we analyze the key security and resilience issues resulting from the application of wireless mesh networks within UAV swarms. ...
PASER is a position-aware routing protocol specifically focused on UAV wireless mesh networks [13] . ...
arXiv:2108.13154v1
fatcat:oc2ibkaeaveyto4n33cenr3c7u
Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey
2016
Sensors
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. ...
In [28] , the authors discuss the promising features of game theory approaches for the wireless networks, while in [29, 30] , different trends of using game theory for WSNs have been reviewed. ...
and network operators are responsible for the QoS and spectrum management, respectively. ...
doi:10.3390/s16071003
pmid:27367700
pmcid:PMC4970053
fatcat:3utgdvzzdvhpjnvvsaweywmyvm
Table of contents
2021
IEEE Transactions on Wireless Communications
Xiangming Cai, Weikai Xu, Lin Wang, and Guanrong Chen QoS-Aware Secure Routing Design for Wireless Networks With Selfish Jammers ......................................... .............................. ...
Goldsmith Gradient Statistics Aware Power Control for Over-the-Air Federated Learning ......... ...
doi:10.1109/twc.2021.3094369
fatcat:5vtsl4bynjeczccctefkwlzoiq
Game Theoretic Approaches in Vehicular Networks: A Survey
[article]
2020
arXiv
pre-print
Game theory, a theoretical framework designed for strategic interactions among rational decision-makers who faced with scarce resources, can be used to model and analyze individual or group behaviors of ...
However, as the number of connected nodes keeps increasing, it is challenging to satisfy various and large amounts of service requests with different Quality of Service (QoS ) and security requirements ...
: GT has been widely applied for mitigating selfish behaviors of packet forwarding in wireless networks. ...
arXiv:2006.00992v1
fatcat:lljjlitvlvbvhbg3aot5xszefm
2012 TMC Annual Index
2013
IEEE Transactions on Mobile Computing
Xu, Dan, +, TMC Aug. 2012 1372-1385 Leveraging the Algebraic Connectivity of a Cognitive Network for Routing Design. ...
Choi, Jae-Ho, +, TMC Feb. 2012 278-291
Leveraging the Algebraic Connectivity of a Cognitive Network for Routing
Design. ...
doi:10.1109/tmc.2013.1
fatcat:qp57tpkfx5gbrc3dvtetebm3ui
Security: A Core Issue in Mobile Ad hoc Networks
2015
Journal of Computer and Communications
The Mobile Ad hoc Networks (MANETs) are optimal choice to accommodate this growing trend but there is a problem, security is the core issue. MANETs rely on wireless links for communication. ...
Wireless networks are considered more exposed to security attacks as compared to wired networks, especially; MANETs are the soft target due to vulnerable in nature. ...
Acknowledgements I, personally feel extremely beholden to Prof(R) Ghulam Qasim Shah who with self-abnegation graciously spared his time and reviewed this paper. ...
doi:10.4236/jcc.2015.312005
fatcat:oaovaaafp5bnfihxgxlcww6os4
Applications of Economic and Pricing Models for Wireless Network Security: A Survey
[article]
2017
arXiv
pre-print
Unlike wireline networks, the broadcast nature and the highly dynamic change of network environments pose a number of nontrivial challenges to security design in wireless networks. ...
in wireless networks. ...
Wireless networks play an extremely important role in many applications. However, security for wireless networks remains a big challenge. ...
arXiv:1707.07846v1
fatcat:xb3jvolwmjad7oxdefdd2pq7dq
Cognitive Radio for Smart Grids: Survey of Architectures, Spectrum Sensing Mechanisms, and Networking Protocols
2016
IEEE Communications Surveys and Tutorials
Cognitive radio networks (CRNs) in particular are highly promising for providing timely SG wireless communications by utilizing all available spectrum resources. ...
We furthermore present open issues and research challenges faced by CR-based SG networks along with future directions. ...
Spectrum-aware multichannel routing algorithms should be designed to improve the efficiency of spectrum usage with minimum event-to-sink delays. ...
doi:10.1109/comst.2015.2481722
fatcat:rnchxiumhndqho5tlumonfdoxi
2014 Index IEEE Transactions on Parallel and Distributed Systems Vol. 25
2015
IEEE Transactions on Parallel and Distributed Systems
Sun, W., +, TPDS Nov. 2014 3025-3035 Truthful QoS-Aware Spectrum Auction with Spatial Reuse for Large-Scale Networks. ...
Tang, Shaojie, +, TPDS Jan. 2014 2-11
A Truthful QoS-Aware Spectrum Auction with Spatial Reuse for Large-
Scale Networks. ...
., +, TPDS Aug. 2014 2840 -2850 Energy and Network Aware Workload Management for Sustainable Data Centers with Thermal Storage. 2030 -2042 Hyperbolic Utilization Bounds for Rate Monotonic Scheduling ...
doi:10.1109/tpds.2014.2371591
fatcat:qxyljogalrbfficryqjowgv3je
A layered approach to cognitive radio network security: A survey
2014
Computer Networks
With the realization of cognitive radio networks came the recognition that both new and old security threats are relevant. ...
The cognitive radio network is still vulnerable to many of the denial of service, wormhole, routing, and jamming attacks that plague other wireless technologies. ...
Additionally, countermeasures to the insider attack can be adopted from wireless sensor network studies, such as the security aware ad hoc routing protocol (SAR). ...
doi:10.1016/j.comnet.2014.10.001
fatcat:eo4kskzcbzdvfap7srpsdhxkpy
The future of security in Wireless Multimedia Sensor Networks
2009
Telecommunications Systems
This is a position paper on our views on security aspects of Wireless Multimedia Sensor Networks (Secure WMSNs). It is meant to serve as a brief survey. ...
ASAR: an Antbased Service Aware Routing algorithm for multimedia sensor networks. Frontiers of Electrical and Electronic Engineering in China, 3(1), 25-33. 15. ...
Ant-based Service Aware Routing (ASAR) [14] chooses paths according to QoS requirements and defines three types of services: Event-driven services, data query-driven services and stream query-driven ...
doi:10.1007/s11235-009-9235-0
fatcat:rcwslfkznvhcdcxe5ngn4upvfy
An Investigative Survey of different Security Attacks in MANETs
2015
International Journal of Computer Applications
Conventional security policies and mechanisms designed for wired networks are mostly considered inadequate and ineffective for these highly dynamic and resource-constrained Adhoc networks. ...
To design and develop security models for MANETs we must first be intriguing about the possible security attacks that may pounce upon different adhoc network scenarios. ...
Proper security policies & measures should be considered or designed taking in consideration the features & applications of mobile adhoc networks. ...
doi:10.5120/ijca2015905977
fatcat:gd653ytjkfewrdbu6ydkmvlpj4
Categorized Security Threats in the Wireless Sensor Networks: Countermeasures and Security Management Schemes
2013
International Journal of Computer Applications
You will get a general introduction about wireless sensor networks in section I, section II explains the need for security in Wireless sensor networks, section III gives security challenges followed by ...
section IV &V that give security and survivability requirements for a Wireless sensor network which follows attack categorization in section VI, followed by the security management schemes in section ...
Protocols, including security mechanisms designed for the WSN, should be energy aware and efficient. ...
doi:10.5120/10718-5262
fatcat:6ep6stzssbb6hnqfpitldoytgi
5G device-to-device communication security and multipath routing solutions
2019
Applied Network Science
This paper presents a survey of the literature on security problems relating to D2D communications in mobile 5G networks. ...
millions of existing devices without adequate built-in security, as well as new devices whose extreme computing power will make them attractive targets for hackers. ...
Secure multipath routing related work Use of mutipath routing for secure and reliable transmission of data has been extensively studied in the context of wireless sensor networks and multipath TCP (MPTCP ...
doi:10.1007/s41109-019-0220-6
fatcat:cmlbcimy5bhs7af46bqaz7g2mm
When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges
2022
IEEE Open Journal of the Communications Society
This comprehensive review is intended to provide the foundation for and facilitate future studies on exploring the potential of emerging ML for coping with increasingly complex SS and their security problems ...
In particular, we elaborate the state-of-the-art methodologies for improving the performance of SS communication systems for various vital aspects, including ML based cognitive radio networks (CRNs), ML ...
To enable the cellular network to use LTE-U with CA to meet the QoS needs of its users while protecting Wi-Fi Access Points (WAPs) for a network with multiple operators, the problem of LTE-U sum-rate maximization ...
doi:10.1109/ojcoms.2022.3146364
fatcat:ffx3xbq5qzb6hcserskljb4o7u
« Previous
Showing results 1 — 15 out of 38 results