Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
Jamming-resilient frequency hop**-aided secure communication for Internet-of-Things in the presence of an untrusted relay
In this paper, we propose a light-weight jamming-resistant scheme for the Internet-of-Things
(IoT) in 5G networks to ensure high-quality communication in a two-hop cooperative …
(IoT) in 5G networks to ensure high-quality communication in a two-hop cooperative …
A lightweight secure and resilient transmission scheme for the Internet of Things in the presence of a hostile jammer
In this article, we propose a lightweight security scheme for ensuring both information
confidentiality and transmission resiliency in the Internet-of-Things (IoT) communication. A …
confidentiality and transmission resiliency in the Internet-of-Things (IoT) communication. A …
A learning-based spectrum access Stackelberg game: Friendly jammer-assisted communication confrontation
N Qi, W Wang, M ** implementation in FPGA
Frequency hop** is a main technique for wireless communication, avoiding interference
and interception. This paper provides novel hardware design for frequency-hop** …
and interception. This paper provides novel hardware design for frequency-hop** …
Learning-based secret key generation in relay channels under adversarial attacks
Wireless secret key generation (WSKG) facilitates efficient key agreement protocols for
securing the sixth generation (6G) wireless networks thanks to its inherently lightweight …
securing the sixth generation (6G) wireless networks thanks to its inherently lightweight …