Key management systems for smart grid advanced metering infrastructure: A survey
Smart grids are evolving as the next generation power systems that transform the traditional
ways of functioning of present electrical grids. Advanced metering infrastructure (AMI) is one …
ways of functioning of present electrical grids. Advanced metering infrastructure (AMI) is one …
Anomaly detection in wireless sensor networks: A survey
M Xie, S Han, B Tian, S Parvin - Journal of Network and computer …, 2011 - Elsevier
Since security threats to WSNs are increasingly being diversified and deliberate, prevention-
based techniques alone can no longer provide WSNs with adequate security. However …
based techniques alone can no longer provide WSNs with adequate security. However …
Distributed learning of deep neural network over multiple agents
In domains such as health care and finance, shortage of labeled data and computational
resources is a critical issue while developing machine learning algorithms. To address the …
resources is a critical issue while developing machine learning algorithms. To address the …
Information theoretic security
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …
are reviewed. The basic wire-tap channel model is considered first, and then several specific …
A survey of attacks and countermeasures in mobile ad hoc networks
Security is an essential service for wired and wireless network communications. The
success of mobile ad hoc network (MANET) will depend on people's confidence in its …
success of mobile ad hoc network (MANET) will depend on people's confidence in its …
Detecting and localizing wireless spoofing attacks
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of
attacks on the networks. Although the identity of a node can be verified through …
attacks on the networks. Although the identity of a node can be verified through …
Detection and localization of multiple spoofing attackers in wireless networks
Wireless spoofing attacks are easy to launch and can significantly impact the performance of
networks. Although the identity of a node can be verified through cryptographic …
networks. Although the identity of a node can be verified through cryptographic …
Key management for beyond 5G mobile small cells: A survey
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …
are unanimous that densification of mobile networks is the way forward. The densification …
Detecting and localizing identity-based attacks in wireless and sensor networks
Wireless networks are vulnerable to identity-based attacks, including spoofing and Sybil
attacks, which allows for many other forms of attacks on the networks. Although the identity …
attacks, which allows for many other forms of attacks on the networks. Although the identity …
VWCA: An efficient clustering algorithm in vehicular ad hoc networks
A Daeinabi, AGP Rahbar, A Khademzadeh - Journal of Network and …, 2011 - Elsevier
Vehicular ad hoc networks (VANETs) are appropriate networks that can be used in
intelligent transportation systems. Among challenges in VANET, scalability is a critical issue …
intelligent transportation systems. Among challenges in VANET, scalability is a critical issue …