Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
reach significant levels with the upcoming sixth generation of mobile networks (6G) …
IoT security: Review, blockchain solutions, and open challenges
MA Khan, K Salah - Future generation computer systems, 2018 - Elsevier
With the advent of smart homes, smart cities, and smart everything, the Internet of Things
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …
(IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc …
A survey of physical-layer authentication in wireless communications
N **e, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
Principles of physical layer security in multiuser wireless networks: A survey
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …
multiuser wireless networks. The essential premise of physical layer security is to enable the …
Sybil attacks and their defenses in the internet of things
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …
A systematic review on clone node detection in static wireless sensor networks
The recent state of the art innovations in technology enables the development of low-cost
sensor nodes with processing and communication capabilities. The unique characteristics of …
sensor nodes with processing and communication capabilities. The unique characteristics of …
A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing
In vehicular ad hoc networks (VANETs), trust establishment among vehicles is important to
secure integrity and reliability of applications. In general, trust and reliability help vehicles to …
secure integrity and reliability of applications. In general, trust and reliability help vehicles to …
Data collection for security measurement in wireless sensor networks: A survey
H **e, Z Yan, Z Yao… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Wireless sensor network (WSN) is an indispensible part of Internet of Things that has been
applied in many fields to monitor environments and collect data from surroundings …
applied in many fields to monitor environments and collect data from surroundings …
Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks
B Bhushan, G Sahoo - Wireless Personal Communications, 2018 - Springer
Advances in hardware manufacturing technology, wireless communications, micro electro-
mechanical devices and information processing technologies enabled the development of …
mechanical devices and information processing technologies enabled the development of …
Detecting and localizing wireless spoofing attacks
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of
attacks on the networks. Although the identity of a node can be verified through …
attacks on the networks. Although the identity of a node can be verified through …