Search
Now showing items 51-54 of 54
Dynamic Time-Threshold Based Receive Buffer for Vehicle-to-Cloud Multipath Transmission
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Vehicle-to-cloud is a network access model that aims to share computing resources for vehicles. In vehicle-to-cloud communication, reliable links are critical. Through multipath transmission, comprehensive utilization of ...
Combating jamming attacks in multi-channel IoT networks using game theory
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the ...
Energy-Harvesting Based Jammer Localization: A Battery-Free Approach in Wireless Sensor Networks
(
IEEE
, 2022 , Conference Paper)
Wireless enabling technologies in critical infrastructures are increasing the efficiency of communications. Most of these technologies are vulnerable to jamming attacks. Jamming attacks are among the most effective ...
Exploiting Spatial Correlations: Group Key Generation for Secure IoT Device Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2023 , Conference Paper)
With the exponential growth in IoT devices, especially in healthcare systems, where multiple devices are attributed to one person, the need for a secure and effective group secret key (GSK) generation is intrinsic. GSKs ...