Quantitative models for friendly jammer trustworthiness evaluation in IoT networks
Tài liệu tham khảo
Awin, 2019, Technical issues on cognitive radio-based Internet of Things systems: A survey, IEEE Access, 7, 97887, 10.1109/ACCESS.2019.2929915
Wan, 2020, Iotargos: A multi-layer security monitoring system for internet-of-things in smart homes, 874
Huo, 2021, A learning-aided intermittent cooperative jamming scheme for non-slotted wireless transmission in an IoT system, IEEE Internet Things J.
Hu, 2017, Cooperative-jamming-aided secrecy enhancement in wireless networks with passive eavesdroppers, IEEE Trans. Veh. Technol., 67, 2108, 10.1109/TVT.2017.2744660
He, 2021, Secure transmission in multiple access wiretap channel: Cooperative jamming without sharing CSI, IEEE Trans. Inf. Forensics Secur., 16, 3401, 10.1109/TIFS.2021.3080499
Atapattu, 2014
W. Xu, W. Trappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, in: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2005, pp. 46–57.
Grover, 2014, Jamming and anti-jamming techniques in wireless networks: a survey, Int. J. Ad Hoc Ubiquitous Comput., 17, 197, 10.1504/IJAHUC.2014.066419
A. Josang, R. Ismail, The beta reputation system, in: Proceedings of the 15th Bled Electronic Commerce Conference, Vol. 5, 2002, pp. 2502–2511.
Ray, 2020, IoT based smart home: Security aspects and security architecture, 218
Naik, 2017, Cyber security—IoT, 764
Kandah, 2017, Efficient key management for Big Data gathering in dynamic sensor networks, 667
Jameel, 2018, A comprehensive survey on cooperative relaying and jamming strategies for physical layer security, IEEE Commun. Surv. Tutor., 21, 2734, 10.1109/COMST.2018.2865607
Chen, 2017, A survey on multiple-antenna techniques for physical layer security, IEEE Commun. Surv. Tutor., 19, 1027, 10.1109/COMST.2016.2633387
Lee, 2018, UAV-aided secure communications with cooperative jamming, IEEE Trans. Veh. Technol., 67, 9385, 10.1109/TVT.2018.2853723
Huang, 2019, Reconfigurable intelligent surfaces for energy efficiency in wireless communication, IEEE Trans. Wireless Commun., 18, 4157, 10.1109/TWC.2019.2922609
Wang, 2019, Fair resource allocation in an MEC-enabled ultra-dense IoT network with NOMA, 1
Yu, 2018, Wireless secure communication with beamforming and jamming in time-varying wiretap channels, IEEE Trans. Inf. Forensics Secur., 13, 2087, 10.1109/TIFS.2018.2809695
Huo, 2017, Jamming strategies for physical layer security, IEEE Wirel. Commun., 25, 148, 10.1109/MWC.2017.1700015
Urkowitz, 1967, Energy detection of unknown deterministic signals, Proc. IEEE, 55, 523, 10.1109/PROC.1967.5573
Muralidharan, 2015, An adaptive threshold method for energy based spectrum sensing in cognitive radio networks, 8
Sarala, 2019, Classical energy detection method for spectrum detecting in cognitive radio networks by using robust augmented threshold technique, Cluster Comput., 22, 11109, 10.1007/s10586-017-1311-8
Banta, 1978, Energy detection of unknown deterministic signals in the presence of jamming, IEEE Trans. Aerosp. Electron. Syst., 384, 10.1109/TAES.1978.308664
Ryu, 2015, Trust degree based beamforming for MISO cooperative communication system, IEEE Commun. Lett., 19, 1957, 10.1109/LCOMM.2015.2473160
Muzammal, 2020, A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches, IEEE Internet Things J., 8, 4186, 10.1109/JIOT.2020.3031162
Khan, 2020, Negotiating (dis) trust to advance democracy through media and information literacy, Postdigit. Sci. Educ., 2, 170, 10.1007/s42438-019-00072-9
Ahmad, 2020, Trust management in vehicular ad-hoc networks and Internet-of-Vehicles: Current trends and future research directions, 135
Wu, 2019, BLTM: beta and LQI based trust model for wireless sensor networks, IEEE Access, 7, 43679, 10.1109/ACCESS.2019.2905550
M.M. Arifeen, D. Bhakta, S.R.H. Remu, M.M. Islam, M. Mahmud, M. Kaiser, Hidden Markov model based trust management model for underwater wireless sensor networks, in: Proceedings of the International Conference on Computing Advancements, 2020, pp. 1–5.
Wang, 2017, Jamming partner selection for maximising the worst D2D secrecy rate based on social trust, Trans. Emerg. Telecommun. Technol., 28
Wen, 2019, A scheme for trustworthy friendly jammer selection in cooperative cognitive radio networks, IEEE Trans. Veh. Technol., 68, 3500, 10.1109/TVT.2019.2895639
Verma, 2017, A survey on network methodologies for real-time analytics of massive IoT data and open research issues, IEEE Commun. Surv. Tutor., 19, 1457, 10.1109/COMST.2017.2694469
Natarajan, 2016, Smart health care system using internet of things, J. Netw. Commun. Emerg. Technol. (JNCET), 6
Motlagh, 2017, UAV-based IoT platform: A crowd surveillance use case, IEEE Commun. Mag., 55, 128, 10.1109/MCOM.2017.1600587CM
Cvitić, 2021, Ensemble machine learning approach for classification of IoT devices in smart home, Int. J. Mach. Learn. Cybern., 1
Mekala, 2017, A survey: Smart agriculture IoT with cloud computing, 1
Vippalapalli, 2016, Internet of things (IoT) based smart health care system, 1229
Wyner, 1975, The wire-tap channel, Bell Labs Tech. J., 54, 1355, 10.1002/j.1538-7305.1975.tb02040.x
Yang, 2013, Cooperative secure beamforming for AF relay networks with multiple eavesdroppers, IEEE Signal Process. Lett., 20, 35, 10.1109/LSP.2012.2227313
Gao, 2009, Optimal design of learning based MIMO cognitive radio systems, 2537
Wen, 2018, Secrecy energy efficiency optimization for cooperative jamming in cognitive radio networks, 795
Shu, 2013, On physical layer security for cognitive radio networks, IEEE Netw., 27, 28, 10.1109/MNET.2013.6523805
Chen, 2010, Improved energy detector for random signals in Gaussian noise, IEEE Trans. Wireless Commun., 9, 558, 10.1109/TWC.2010.5403535
Rosenblatt, 1956, A central limit theorem and a strong mixing condition, Proc. Natl. Acad. Sci. USA, 42, 43, 10.1073/pnas.42.1.43
Tandra, 2008, SNR walls for signal detection, IEEE J. Sel. Top. Sign. Proces., 2, 4, 10.1109/JSTSP.2007.914879
Poor, 2013
Kay, 1998
Smith, 1978, A mathematical theory of evidence. by Glenn Shafer, Biometrics, 32, 703, 10.2307/2529769
Jøsang, 2008, A logic for uncertain probabilities, Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 9, 10.1142/S0218488501000831
Ross, 2014