Current research on Internet of Things (IoT) security: A survey

WH Hassan - Computer networks, 2019 - Elsevier
The results of IoT failures can be severe, therefore, the study and research in security issues
in the IoT is of extreme significance. The main objective of IoT security is to preserve privacy …

A survey on technologies and security protocols: Reference for future generation IoT

R Yugha, S Chithra - Journal of Network and Computer Applications, 2020 - Elsevier
Abstract Internet of Things (IoT) is the recent and growing which is inevitable in day-to-day
activities in current life. IoT is the network of systems which interconnect various real world …

Security, privacy and trust for smart mobile-Internet of Things (M-IoT): A survey

V Sharma, I You, K Andersson, F Palmieri… - IEEE …, 2020 - ieeexplore.ieee.org
With an enormous range of applications, the Internet of Things (IoT) has magnetized
industries and academicians from everywhere. IoT facilitates operations through ubiquitous …

Secure communications in tiered 5G wireless networks with cooperative jamming

Y Huo, X Fan, L Ma, X Cheng, Z Tian… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cooperative jamming is deemed as a promising physical layer-based approach to secure
wireless transmissions in the presence of eavesdroppers. In this paper, we investigate …

Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications

X Li, HN Dai, MK Shukla, D Li, H Xu, M Imran - Computer Standards & …, 2021 - Elsevier
The security vulnerabilities are becoming the major obstacle to prevent the wide adoption of
ultra-reliable and low latency communications (URLLC) in 5G and beyond communications …

A scheme for trustworthy friendly jammer selection in cooperative cognitive radio networks

Y Wen, Y Huo, L Ma, T **g… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we consider a centralized cooperative cognitive radio network (CCRN), where
a primary base station sends a message to a primary user. Meanwhile, a secondary user …

Robust MISO beamforming with cooperative jamming for secure transmission from perspectives of QoS and secrecy rate

H Ma, J Cheng, X Wang, P Ma - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Robust quality-of-service (QoS)-based and secrecy rate-based secure transmission designs
are investigated for a multiple-input single-output system with multiple eavesdroppers and a …

Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection

PT Tin, P Minh Nam, T Trung Duy, PT Tran, M Voznak - Sensors, 2019 - mdpi.com
In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor
networks (WSNs). In the secondary network, a source transmits its data to a destination via …

A novel cooperative jamming scheme for wireless social networks without known CSI

L Huang, X Fan, Y Huo, C Hu, Y Tian, J Qian - IEEE Access, 2017 - ieeexplore.ieee.org
Considering a wireless social network, we investigate a cooperative jamming scheme based
on the space power synthesis with unknown channel state information (CSI) of …

Sequential fusion to defend against sensing data falsification attack for cognitive Internet of Things

J Wu, C Wang, Y Yu, T Song, J Hu - ETRI Journal, 2020 - Wiley Online Library
Internet of Things (IoT) is considered the future network to support wireless communications.
To realize an IoT network, sufficient spectrum should be allocated for the rapidly increasing …