2016
DOI: 10.1109/tase.2015.2497663
|View full text |Cite
|
Sign up to set email alerts
|

On Secure Wireless Communications for IoT Under Eavesdropper Collusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
62
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 121 publications
(62 citation statements)
references
References 34 publications
0
62
0
Order By: Relevance
“…In this atmosphere network executives cannot control the security approaches in which they merely get rid of the low hanging fruit of security vulnerabilities hoping that attackers would quickly move on to the next easy target [19] [20] 1) Intruder Attack: This type of attack is generally made on assumption. An intruder which is result the system and which can interrupt all communication ever communicated among IoT strategies and centers.…”
Section: Security Threats In Internet Of Thingsmentioning
confidence: 99%
“…In this atmosphere network executives cannot control the security approaches in which they merely get rid of the low hanging fruit of security vulnerabilities hoping that attackers would quickly move on to the next easy target [19] [20] 1) Intruder Attack: This type of attack is generally made on assumption. An intruder which is result the system and which can interrupt all communication ever communicated among IoT strategies and centers.…”
Section: Security Threats In Internet Of Thingsmentioning
confidence: 99%
“…From the eavesdropper's design perspective, the colluding eavesdropping scenario yields the best possible performance of illegitimate link while it represents the worst case scenario in the viewpoint of secure transmission [35]- [37]. Additionally, all Eves are assumed to be perfectly colluded where the inter-eavesdropper channels are considered error-free.…”
Section: System and Channel Modelsmentioning
confidence: 99%
“…Although the IDS has led to a number of valuable network security techniques [3,4,14,15,16,17,18,33,40,41,42], the existing solutions are limited only to static data release.…”
Section: Introductionmentioning
confidence: 99%