A jamming combating power allocation strategy is proposed to secure the data communication in IoT networks. The proposed strategy aims to minimize the worst case jamming effect on the intended transmission under multi channel fading and total power constraints by modelling the problem as a Colonel Blotto game Nash Equibrium (NE). Both Logistic Regression as well as a specifically designed algorithm are used to iteratively and rapidly obtain the equilibrium strategy. The conducted theoretical derivations and Monte Carlo simulations confirm that the proposed approach can secure the IoT network with a limited amount of power and with a number of iterations that is much reduced compared to state-of-the-art techniques
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
Considering the ongoing development of various devices and rich applications in intelligent Internet...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by mal...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
The internet of Things (IoT) is used to interconnect a massive number of heterogeneous resource cons...
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jam...
Jamming may become a serious threat in Internet of Things networks of battery-powered nodes, as atta...
© 2018 IEEE. The Cognitive Radio can be considered as a mandatory part of the Internet of Things app...
Towards securing wireless networks and ensuring their dependability under jamming attacks, this pape...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
Considering the ongoing development of various devices and rich applications in intelligent Internet...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by mal...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
The internet of Things (IoT) is used to interconnect a massive number of heterogeneous resource cons...
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jam...
Jamming may become a serious threat in Internet of Things networks of battery-powered nodes, as atta...
© 2018 IEEE. The Cognitive Radio can be considered as a mandatory part of the Internet of Things app...
Towards securing wireless networks and ensuring their dependability under jamming attacks, this pape...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...
Considering the ongoing development of various devices and rich applications in intelligent Internet...
In many Internet of Thing (IoT) application domains security is a critical requirement, because mali...