A survey on IoT intrusion detection: Federated learning, game theory, social psychology, and explainable AI as future directions

S Arisdakessian, OA Wahab, A Mourad… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
In the past several years, the world has witnessed an acute surge in the production and
usage of smart devices which are referred to as the Internet of Things (IoT). These devices …

Reliability of autonomous Internet of Things systems with intrusion detection attack-defense game design

DC Wang, R Chen, H Al-Hamadi - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this article we develop an intrusion detection attack-defense game for Internet of Things
(IoT) systems for which autonomous IoT devices collaboratively solve a problem. We …

Trust-based mechanism design for cooperative spectrum sensing in cognitive radio networks

J Wang, R Chen, JJP Tsai, DC Wang - Computer Communications, 2018 - Elsevier
We propose and analyze trust-based cooperative spectrum sensing data fusion schemes
against spectrum sensing data falsification attacks in cognitive radio networks. We first …

Distributed clustering for secure multitask estimation based on adaptive task switching

F Chen, J Li, Y Zhang, X Shao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Consider adversarial multitask networks with a high cost of sharing genuine information,
where agents feed others unreliable information according to a time-varying probability …

Trust-based cooperative spectrum sensing against SSDF attacks in distributed cognitive radio networks

J Wang, R Chen, JJP Tsai… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
We propose and analyze a trust-based data fusion scheme against spectrum sensing data
falsification attacks in a distributed cognitive radio network. Our trust-based data fusion …

Information reliability in complex multitask networks

S Monajemi, S Sanei, SH Ong - Future Generation Computer Systems, 2018 - Elsevier
In this paper, we study the performance of multitask distributed networks where sharing
genuine information is costly. We formulate an information credibility model which links the …

Information credibility modeling in cooperative networks: equilibrium and mechanism design

C Jiang, L Kuang, Z Han, Y Ren… - IEEE Journal on …, 2017 - ieeexplore.ieee.org
In a cooperative network, the user equipment (UE) shares information for cooperatively
achieving a common goal. However, owing to the concerns of privacy or cost, UEs may be …

Trust-based data fusion mechanism design in cognitive radio networks

J Wang, R Chen - 2014 IEEE conference on communications …, 2014 - ieeexplore.ieee.org
Cognitive radio is a promising solution for spectrum scarcities in the future. Secondary users
(SUs) adopt cooperative sensing to learn the primary user's (PU's) occupancy activity. This …

On modeling of adversary behavior and defense for survivability of military MANET applications

R Chen, R Mitchell, JH Cho - MILCOM 2015-2015 IEEE Military …, 2015 - ieeexplore.ieee.org
In this paper we develop a methodology and report preliminary results for modeling
attack/defense behaviors for achieving high survivability of military mobile ad hoc networks …

Information credibility equilibrium of cooperative networks

C Jiang, Z Han, Y Ren, L Hanzo - 2016 IEEE Wireless …, 2016 - ieeexplore.ieee.org
In a cooperative network the user equipment (UE) share information with each other for
cooperatively achieving a common goal. While owing to the concerns of privacy or cost, UEs …