Key management systems for smart grid advanced metering infrastructure: A survey

A Ghosal, M Conti - IEEE Communications Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Smart grids are evolving as the next generation power systems that transform the traditional
ways of functioning of present electrical grids. Advanced metering infrastructure (AMI) is one …

Anomaly detection in wireless sensor networks: A survey

M Xie, S Han, B Tian, S Parvin - Journal of Network and computer …, 2011 - Elsevier
Since security threats to WSNs are increasingly being diversified and deliberate, prevention-
based techniques alone can no longer provide WSNs with adequate security. However …

Distributed learning of deep neural network over multiple agents

O Gupta, R Raskar - Journal of Network and Computer Applications, 2018 - Elsevier
In domains such as health care and finance, shortage of labeled data and computational
resources is a critical issue while developing machine learning algorithms. To address the …

Information theoretic security

Y Liang, HV Poor, S Shamai - Foundations and Trends® in …, 2009 - nowpublishers.com
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …

A survey of attacks and countermeasures in mobile ad hoc networks

B Wu, J Chen, J Wu, M Cardei - Wireless network security, 2007 - Springer
Security is an essential service for wired and wireless network communications. The
success of mobile ad hoc network (MANET) will depend on people's confidence in its …

Detecting and localizing wireless spoofing attacks

Y Chen, W Trappe, RP Martin - … on sensor, mesh and ad hoc …, 2007 - ieeexplore.ieee.org
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of
attacks on the networks. Although the identity of a node can be verified through …

Detection and localization of multiple spoofing attackers in wireless networks

J Yang, Y Chen, W Trappe… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Wireless spoofing attacks are easy to launch and can significantly impact the performance of
networks. Although the identity of a node can be verified through cryptographic …

Key management for beyond 5G mobile small cells: A survey

M De Ree, G Mantas, A Radwan, S Mumtaz… - IEEE …, 2019 - ieeexplore.ieee.org
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …

Detecting and localizing identity-based attacks in wireless and sensor networks

Y Chen, J Yang, W Trappe… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Wireless networks are vulnerable to identity-based attacks, including spoofing and Sybil
attacks, which allows for many other forms of attacks on the networks. Although the identity …

VWCA: An efficient clustering algorithm in vehicular ad hoc networks

A Daeinabi, AGP Rahbar, A Khademzadeh - Journal of Network and …, 2011 - Elsevier
Vehicular ad hoc networks (VANETs) are appropriate networks that can be used in
intelligent transportation systems. Among challenges in VANET, scalability is a critical issue …