Jamming may become a serious threat in Internet of Things networks of battery-powered nodes, as attackers can disrupt packet delivery and significantly reduce the lifetime of the nodes. In this work, we model an active defense scenario in which an energy-limited node uses power control to defend itself from a malicious attacker, whose energy constraints may not be known to the defender. The interaction between the two nodes is modeled as an asymmetric Bayesian game where the victim has incomplete information about the attacker. We show how to derive the optimal Bayesian strategies for both the defender and the attacker, which may then serve as guidelines to develop and gauge efficient heuristics that are less computationally expensive than ...
We consider a scenario where a sophisticated jammer jams an area in which a single-channel random-ac...
We consider security issues in Cyber-Physical Systems (CPSs). A sensor node communicates with a remo...
Abstract—We consider a scenario where a sophisticated jammer jams an area in which a single-channel ...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
A jamming combating power allocation strategy is proposed to secure the data communication in IoT ne...
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by mal...
The internet of Things (IoT) is used to interconnect a massive number of heterogeneous resource cons...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
In wireless ad hoc networks, although defense strategies such as intrusion detection systems (IDSs) ...
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jam...
The openness of wireless communication and the recent de-velopment of software-defined radio technol...
Towards securing wireless networks and ensuring their dependability under jamming attacks, this pape...
In this paper, we present a novel formulation of the problem of energy misbehavior and develop an an...
We consider a scenario where a sophisticated jammer jams an area in which a single-channel random-ac...
We consider security issues in Cyber-Physical Systems (CPSs). A sensor node communicates with a remo...
Abstract—We consider a scenario where a sophisticated jammer jams an area in which a single-channel ...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
A jamming combating power allocation strategy is proposed to secure the data communication in IoT ne...
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by mal...
The internet of Things (IoT) is used to interconnect a massive number of heterogeneous resource cons...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
In wireless ad hoc networks, although defense strategies such as intrusion detection systems (IDSs) ...
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jam...
The openness of wireless communication and the recent de-velopment of software-defined radio technol...
Towards securing wireless networks and ensuring their dependability under jamming attacks, this pape...
In this paper, we present a novel formulation of the problem of energy misbehavior and develop an an...
We consider a scenario where a sophisticated jammer jams an area in which a single-channel random-ac...
We consider security issues in Cyber-Physical Systems (CPSs). A sensor node communicates with a remo...
Abstract—We consider a scenario where a sophisticated jammer jams an area in which a single-channel ...