Key management systems for smart grid advanced metering infrastructure: A survey

A Ghosal, M Conti - IEEE Communications Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Smart grids are evolving as the next generation power systems that transform the traditional
ways of functioning of present electrical grids. Advanced metering infrastructure (AMI) is one …

Information theoretic security

Y Liang, HV Poor, S Shamai - Foundations and Trends® in …, 2009 - nowpublishers.com
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …

A survey of attacks and countermeasures in mobile ad hoc networks

B Wu, J Chen, J Wu, M Cardei - Wireless network security, 2007 - Springer
Security is an essential service for wired and wireless network communications. The
success of mobile ad hoc network (MANET) will depend on people's confidence in its …

Detecting and localizing wireless spoofing attacks

Y Chen, W Trappe, RP Martin - … on sensor, mesh and ad hoc …, 2007 - ieeexplore.ieee.org
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of
attacks on the networks. Although the identity of a node can be verified through …

Detection and localization of multiple spoofing attackers in wireless networks

J Yang, Y Chen, W Trappe… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Wireless spoofing attacks are easy to launch and can significantly impact the performance of
networks. Although the identity of a node can be verified through cryptographic …

Key management for beyond 5G mobile small cells: A survey

M De Ree, G Mantas, A Radwan, S Mumtaz… - IEEE …, 2019 - ieeexplore.ieee.org
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …

Detecting and localizing identity-based attacks in wireless and sensor networks

Y Chen, J Yang, W Trappe… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Wireless networks are vulnerable to identity-based attacks, including spoofing and Sybil
attacks, which allows for many other forms of attacks on the networks. Although the identity …

VWCA: An efficient clustering algorithm in vehicular ad hoc networks

A Daeinabi, AGP Rahbar, A Khademzadeh - Journal of Network and …, 2011 - Elsevier
Vehicular ad hoc networks (VANETs) are appropriate networks that can be used in
intelligent transportation systems. Among challenges in VANET, scalability is a critical issue …