[HTML][HTML] A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks

KY Tsao, T Girdler, VG Vassilakis - Ad Hoc Networks, 2022‏ - Elsevier
Unmanned aerial vehicles (UAVs) are a rapidly evolving technology, and being highly
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …

Ghost-in-zigbee: Energy depletion attack on zigbee-based wireless networks

X Cao, DM Shila, Y Cheng, Z Yang… - IEEE Internet of …, 2016‏ - ieeexplore.ieee.org
ZigBee has been widely recognized as an important enabling technique for Internet of
Things (IoT). However, the ZigBee nodes are normally resource-limited, making the network …

Security threats and countermeasures of MAC layer in cognitive radio networks

MR Manesh, N Kaabouch - Ad Hoc Networks, 2018‏ - Elsevier
Cognitive radio is a promising technology proposed to solve the scarcity of the radio
spectrum by opportunistically allocating the idle channels of the licensed users to …

Energy depletion attacks in low power wireless networks

VL Nguyen, PC Lin, RH Hwang - IEEE Access, 2019‏ - ieeexplore.ieee.org
Low Power Wireless (LPW) networks have recently been emerging as key candidates to
offer affordable connectivity for the constrained devices in the Internet of Things (IoT) …

[PDF][PDF] A Reliable Trustworthy Approach Based on Node Behavior Prediction for Secure Routing in MANET.

K Sridevi, M Sridhar - … Journal of Intelligent Engineering & Systems, 2017‏ - researchgate.net
An unstructured version of a traditional wireless network provides a mobile ad hoc network
(MANET) that is well suited for emergencies. However, due to lack of infrastructure and …

Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs

D Al-Terri, H Otrok, H Barada, M Al-Qutayri… - Computer …, 2017‏ - Elsevier
In this paper, we address the problem of greediness in IEEE 802.11 CSMA/CA protocol in
Vehicular Ad-hoc Networks (VANETs). In VANETs some nodes might misbehave by …

Reliable code disseminations through opportunistic communication in vehicular wireless networks

T Li, NN ** - IEEE access, 2018‏ - ieeexplore.ieee.org
Large numbers of software-defined sensor devices have formed a basic infrastructure for
data collection. One of the challenges is how to update the program codes of devices in a …

Adaptive jammer localization in wireless networks

T Wang, X Wei, J Fan, T Liang - Computer Networks, 2018‏ - Elsevier
The shared nature of wireless communication, the open access to wireless medium, the
tightly coupled design principle of wireless network protocol and the scarcity of radio …

Misbehavior detection in Wi-Fi/LTE coexistence over unlicensed bands

I Samy, X Han, L Lazos, M Li, Y **ao… - IEEE Transactions on …, 2022‏ - ieeexplore.ieee.org
We address the problem of detecting misbehavior in the coexistence etiquette between LTE
and Wi-Fi systems operating in the 5GHz U-NII unlicensed bands. We define selfish …

A green approach for selfish misbehavior detection in 802.11-based wireless networks

T Hayajneh, G Almashaqbeh, S Ullah - Mobile Networks and Applications, 2015‏ - Springer
IEEE 802.11 is one of the most well-established and widely used standard for wireless LAN.
Its Medium Access control (MAC) layer assumes that the devices adhere to the standard's …