Articles with "networks secure" as a keyword



Photo by hudsoncrafted from unsplash

Secure and reliable routing in cognitive radio networks

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Networks"

DOI: 10.1007/s11276-016-1212-4

Abstract: Due to the mobility of node and different spectrum availability pattern, CR networks are frequently divided into unpredictable partitions. Usually, these partitions are irregularly connected; hence, secure and reliable routing becomes major issue for these… read more here.

Keywords: secure reliable; routing cognitive; reliable routing; cognitive radio ... See more keywords

Secure localization using hypothesis testing in wireless networks

Sign Up to like & get
recommendations!
Published in 2018 at "Ad Hoc Networks"

DOI: 10.1016/j.adhoc.2018.03.008

Abstract: Abstract Localization is the method of estimating the location of a wireless node using measured inputs such as distances from nodes with known locations. When the measured distances from anchor nodes are used for localization,… read more here.

Keywords: localization using; networks secure; method; using hypothesis ... See more keywords

A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Signal and Information Processing over Networks"

DOI: 10.1109/tsipn.2017.2697724

Abstract: We address the problem of centralized detection of a binary event in the presence of $\beta$ fraction falsifiable sensor nodes (SNs) (i.e., controlled by an attacker) for a bandwidth-constrained under-attack spatially uncorrelated distributed wireless sensor… read more here.

Keywords: detection; compromised sns; networks secure; wireless sensor ... See more keywords
Photo from wikipedia

Secure Information Sharing in Adversarial Adaptive Diffusion Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Signal and Information Processing over Networks"

DOI: 10.1109/tsipn.2017.2787910

Abstract: In this paper, information sharing over adversarial adaptive networks is considered. Defense against adversarial attacks is enforced by an attack detection mechanism that guides the diffusion strategy in the parameter estimation task and the transmission… read more here.

Keywords: information; diffusion; sharing adversarial; information sharing ... See more keywords