Quantitative models for friendly jammer trustworthiness evaluation in IoT networks

Ad Hoc Networks - Tập 137 - Trang 102994 - 2022
Yingkun Wen1, Yan Huo1, Liran Ma2, Tao Jing1, Qinghe Gao1
1School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing, China
2Department of Computer Science, Texas Christian University, Fort Worth, TX, USA

Tài liệu tham khảo

Awin, 2019, Technical issues on cognitive radio-based Internet of Things systems: A survey, IEEE Access, 7, 97887, 10.1109/ACCESS.2019.2929915 Wan, 2020, Iotargos: A multi-layer security monitoring system for internet-of-things in smart homes, 874 Huo, 2021, A learning-aided intermittent cooperative jamming scheme for non-slotted wireless transmission in an IoT system, IEEE Internet Things J. Hu, 2017, Cooperative-jamming-aided secrecy enhancement in wireless networks with passive eavesdroppers, IEEE Trans. Veh. Technol., 67, 2108, 10.1109/TVT.2017.2744660 He, 2021, Secure transmission in multiple access wiretap channel: Cooperative jamming without sharing CSI, IEEE Trans. Inf. Forensics Secur., 16, 3401, 10.1109/TIFS.2021.3080499 Atapattu, 2014 W. Xu, W. Trappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, in: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2005, pp. 46–57. Grover, 2014, Jamming and anti-jamming techniques in wireless networks: a survey, Int. J. Ad Hoc Ubiquitous Comput., 17, 197, 10.1504/IJAHUC.2014.066419 A. Josang, R. Ismail, The beta reputation system, in: Proceedings of the 15th Bled Electronic Commerce Conference, Vol. 5, 2002, pp. 2502–2511. Ray, 2020, IoT based smart home: Security aspects and security architecture, 218 Naik, 2017, Cyber security—IoT, 764 Kandah, 2017, Efficient key management for Big Data gathering in dynamic sensor networks, 667 Jameel, 2018, A comprehensive survey on cooperative relaying and jamming strategies for physical layer security, IEEE Commun. Surv. Tutor., 21, 2734, 10.1109/COMST.2018.2865607 Chen, 2017, A survey on multiple-antenna techniques for physical layer security, IEEE Commun. Surv. Tutor., 19, 1027, 10.1109/COMST.2016.2633387 Lee, 2018, UAV-aided secure communications with cooperative jamming, IEEE Trans. Veh. Technol., 67, 9385, 10.1109/TVT.2018.2853723 Huang, 2019, Reconfigurable intelligent surfaces for energy efficiency in wireless communication, IEEE Trans. Wireless Commun., 18, 4157, 10.1109/TWC.2019.2922609 Wang, 2019, Fair resource allocation in an MEC-enabled ultra-dense IoT network with NOMA, 1 Yu, 2018, Wireless secure communication with beamforming and jamming in time-varying wiretap channels, IEEE Trans. Inf. Forensics Secur., 13, 2087, 10.1109/TIFS.2018.2809695 Huo, 2017, Jamming strategies for physical layer security, IEEE Wirel. Commun., 25, 148, 10.1109/MWC.2017.1700015 Urkowitz, 1967, Energy detection of unknown deterministic signals, Proc. IEEE, 55, 523, 10.1109/PROC.1967.5573 Muralidharan, 2015, An adaptive threshold method for energy based spectrum sensing in cognitive radio networks, 8 Sarala, 2019, Classical energy detection method for spectrum detecting in cognitive radio networks by using robust augmented threshold technique, Cluster Comput., 22, 11109, 10.1007/s10586-017-1311-8 Banta, 1978, Energy detection of unknown deterministic signals in the presence of jamming, IEEE Trans. Aerosp. Electron. Syst., 384, 10.1109/TAES.1978.308664 Ryu, 2015, Trust degree based beamforming for MISO cooperative communication system, IEEE Commun. Lett., 19, 1957, 10.1109/LCOMM.2015.2473160 Muzammal, 2020, A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches, IEEE Internet Things J., 8, 4186, 10.1109/JIOT.2020.3031162 Khan, 2020, Negotiating (dis) trust to advance democracy through media and information literacy, Postdigit. Sci. Educ., 2, 170, 10.1007/s42438-019-00072-9 Ahmad, 2020, Trust management in vehicular ad-hoc networks and Internet-of-Vehicles: Current trends and future research directions, 135 Wu, 2019, BLTM: beta and LQI based trust model for wireless sensor networks, IEEE Access, 7, 43679, 10.1109/ACCESS.2019.2905550 M.M. Arifeen, D. Bhakta, S.R.H. Remu, M.M. Islam, M. Mahmud, M. Kaiser, Hidden Markov model based trust management model for underwater wireless sensor networks, in: Proceedings of the International Conference on Computing Advancements, 2020, pp. 1–5. Wang, 2017, Jamming partner selection for maximising the worst D2D secrecy rate based on social trust, Trans. Emerg. Telecommun. Technol., 28 Wen, 2019, A scheme for trustworthy friendly jammer selection in cooperative cognitive radio networks, IEEE Trans. Veh. Technol., 68, 3500, 10.1109/TVT.2019.2895639 Verma, 2017, A survey on network methodologies for real-time analytics of massive IoT data and open research issues, IEEE Commun. Surv. Tutor., 19, 1457, 10.1109/COMST.2017.2694469 Natarajan, 2016, Smart health care system using internet of things, J. Netw. Commun. Emerg. Technol. (JNCET), 6 Motlagh, 2017, UAV-based IoT platform: A crowd surveillance use case, IEEE Commun. Mag., 55, 128, 10.1109/MCOM.2017.1600587CM Cvitić, 2021, Ensemble machine learning approach for classification of IoT devices in smart home, Int. J. Mach. Learn. Cybern., 1 Mekala, 2017, A survey: Smart agriculture IoT with cloud computing, 1 Vippalapalli, 2016, Internet of things (IoT) based smart health care system, 1229 Wyner, 1975, The wire-tap channel, Bell Labs Tech. J., 54, 1355, 10.1002/j.1538-7305.1975.tb02040.x Yang, 2013, Cooperative secure beamforming for AF relay networks with multiple eavesdroppers, IEEE Signal Process. Lett., 20, 35, 10.1109/LSP.2012.2227313 Gao, 2009, Optimal design of learning based MIMO cognitive radio systems, 2537 Wen, 2018, Secrecy energy efficiency optimization for cooperative jamming in cognitive radio networks, 795 Shu, 2013, On physical layer security for cognitive radio networks, IEEE Netw., 27, 28, 10.1109/MNET.2013.6523805 Chen, 2010, Improved energy detector for random signals in Gaussian noise, IEEE Trans. Wireless Commun., 9, 558, 10.1109/TWC.2010.5403535 Rosenblatt, 1956, A central limit theorem and a strong mixing condition, Proc. Natl. Acad. Sci. USA, 42, 43, 10.1073/pnas.42.1.43 Tandra, 2008, SNR walls for signal detection, IEEE J. Sel. Top. Sign. Proces., 2, 4, 10.1109/JSTSP.2007.914879 Poor, 2013 Kay, 1998 Smith, 1978, A mathematical theory of evidence. by Glenn Shafer, Biometrics, 32, 703, 10.2307/2529769 Jøsang, 2008, A logic for uncertain probabilities, Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 9, 10.1142/S0218488501000831 Ross, 2014