Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022 - mdpi.com
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …

RIS-assisted visible light communication systems: A tutorial

S Aboagye, AR Ndjiongue… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Recent intensive and extensive development of the fifth-generation (5G) of cellular networks
has led to their deployment throughout much of the world. As part of this implementation …

Intelligent reflecting surface assisted anti-jamming communications: A fast reinforcement learning approach

H Yang, Z **ong, J Zhao, D Niyato, Q Wu… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Malicious jamming launched by smart jammers can attack legitimate transmissions, which
has been regarded as one of the critical security challenges in wireless communications …

An intermittent anti-competition communication mechanism based formation maneuvers for the internet of unmanned surface vehicles

B Huang, X Ren, B Zhou, Z Zhang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The development of unmanned surface vehicles (USVs) technologies considerably promote
the application of Internet of Things (IoT) in marine activities. However, frequently changed …

GPDS: A multi-agent deep reinforcement learning game for anti-jamming secure computing in MEC network

M Chen, W Liu, N Zhang, J Li, Y Ren, M Yi… - Expert Systems with …, 2022 - Elsevier
Abstract The openness of Mobile Edge Computing (MEC) networks makes them vulnerable
to interference attacks by malicious jammers, which endangers the communication quality of …

Mitigating jamming attack in 5G heterogeneous networks: A federated deep reinforcement learning approach

H Sharma, N Kumar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Jamming attack is one of the serious security breaches in the upcoming fifth-generation
heterogeneous networks (5G HetNets). Most of the existing anti-jamming techniques, such …

Outage constrained robust beamforming optimization for multiuser IRS-assisted anti-jamming communications with incomplete information

Y Sun, K An, J Luo, Y Zhu, G Zheng… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Malicious jamming attacks have been regarded as a serious threat to Internet of Things (IoT)
networks, which can significantly degrade the Quality of Service (QoS) of users. This article …

Game theory and reinforcement learning for anti-jamming defense in wireless communications: Current research, challenges, and solutions

L Jia, N Qi, Z Su, F Chu, S Fang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Due to the inherently open and shared nature of the wireless channels, wireless
communication networks are vulnerable to jamming attacks, and effective anti-jamming …

Cloud-fog automation: Vision, enabling technologies, and future research directions

J **, K Yu, J Kua, N Zhang, Z Pang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The Industry 4.0 digital transformation envisages future industrial systems to be fully
automated, including the control, upgrade, and configuration processes of a large number of …

Wireless communication, sensing, and REM: A security perspective

HM Furqan, MSJ Solaija, H Türkmen… - IEEE Open Journal of …, 2021 - ieeexplore.ieee.org
The diverse requirements of next-generation communication systems necessitate
awareness, flexibility, and intelligence as essential building blocks of future wireless …