The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread and its heterogeneity. In such networks, jamming attacks are widely used by malicious users to compromise the private and secure communications. Many techniques are proposed in the literature to secure the network from malicious jamming attacks. However, most of these techniques require either the implementation of complex coordination schemes or the use of high transmission power and are therefore challenging to implement in limited resources IoT networks. In this paper, a low complexity anti-jamming defending strategy using smart power allocation under limited power constraints is proposed for health monitoring IoT networks. This strategy i...
In this article, the anti-jamming communication problem is investigated from a game-theoretic learni...
This paper develops a game-theoretic defense approach against jamming attacks targeting access point...
We consider a scenario where a sophisticated jammer jams an area in which a single-channel random-ac...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
The internet of Things (IoT) is used to interconnect a massive number of heterogeneous resource cons...
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by mal...
A jamming combating power allocation strategy is proposed to secure the data communication in IoT ne...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
Jamming may become a serious threat in Internet of Things networks of battery-powered nodes, as atta...
© 2018 IEEE. The Cognitive Radio can be considered as a mandatory part of the Internet of Things app...
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jam...
Nowadays wireless sensor networks (WSNs) are going to be more prone to different security threats an...
International audienceComposed of devices with limited resources, IoT networks have several vulnerab...
Towards securing wireless networks and ensuring their dependability under jamming attacks, this pape...
In this article, the anti-jamming communication problem is investigated from a game-theoretic learni...
This paper develops a game-theoretic defense approach against jamming attacks targeting access point...
We consider a scenario where a sophisticated jammer jams an area in which a single-channel random-ac...
The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread ...
The internet of Things (IoT) is used to interconnect a massive number of heterogeneous resource cons...
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by mal...
A jamming combating power allocation strategy is proposed to secure the data communication in IoT ne...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
Jamming attacks are among the most widely used techniques to block and disturb legitimate communicat...
Jamming may become a serious threat in Internet of Things networks of battery-powered nodes, as atta...
© 2018 IEEE. The Cognitive Radio can be considered as a mandatory part of the Internet of Things app...
In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jam...
Nowadays wireless sensor networks (WSNs) are going to be more prone to different security threats an...
International audienceComposed of devices with limited resources, IoT networks have several vulnerab...
Towards securing wireless networks and ensuring their dependability under jamming attacks, this pape...
In this article, the anti-jamming communication problem is investigated from a game-theoretic learni...
This paper develops a game-theoretic defense approach against jamming attacks targeting access point...
We consider a scenario where a sophisticated jammer jams an area in which a single-channel random-ac...