The internet of Things (IoT) is used to interconnect a massive number of heterogeneous resource constrained smart devices. This makes such networks exposed to various types of malicious attacks. In particular, jamming attacks are among the most common harmful attacks to IoT networks. Therefore, an anti jamming power allocation strategy is first proposed in this paper for health monitoring IoT networks by exploiting game theory to minimize the worst case jamming effect under multi channel fading. This strategy uses an iterative algorithm based on gradient descent to identify the Nash Equilibrium (NE) of the game. An artificial neural network model is also proposed to accelerate the convergence of the algorithm making it more suitable for IoT...
Nowadays wireless sensor networks (WSNs) are going to be more prone to different security threats an...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by mal...
A jamming combating power allocation strategy is proposed to secure the data communication in IoT ne...
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jam...
Jamming may become a serious threat in Internet of Things networks of battery-powered nodes, as atta...
© 2018 IEEE. The Cognitive Radio can be considered as a mandatory part of the Internet of Things app...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
Nowadays wireless sensor networks (WSNs) are going to be more prone to different security threats an...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by mal...
A jamming combating power allocation strategy is proposed to secure the data communication in IoT ne...
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jam...
Jamming may become a serious threat in Internet of Things networks of battery-powered nodes, as atta...
© 2018 IEEE. The Cognitive Radio can be considered as a mandatory part of the Internet of Things app...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
Nowadays wireless sensor networks (WSNs) are going to be more prone to different security threats an...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...