Internet of things: Survey on security

D Mendez Mena, I Papapanagiotou… - … Security Journal: A …, 2018 - Taylor & Francis
ABSTRACT The Internet of things (IoT) is intended for ubiquitous connectivity among
different entities or “things”. While it provides effective and efficient solutions to many real …

Security advances and challenges in 4G wireless networks

N Seddigh, B Nandy, R Makkar… - … Conference on Privacy …, 2010 - ieeexplore.ieee.org
This paper presents a study of security advances and challenges associated with emergent
4G wireless technologies. The paper makes a number of contributions to the field. First, it …

Internet of things: Survey on security and privacy

DM Mendez, I Papapanagiotou, B Yang - arXiv preprint arXiv:1707.01879, 2017 - arxiv.org
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities
or" things". While its purpose is to provide effective and efficient solutions, security of the …

Recursive estimation of structure and motion using relative orientation constraints

A Azarbayejani, B Horowitz… - Proceedings of IEEE …, 1993 - ieeexplore.ieee.org
A recursive estimation technique for recovering the 3-D motion and pointwise structure of an
object is presented. It is based on the use of relative orientation constraints in a local …

Linearly constrained bimatrix games in wireless communications

K Firouzbakht, G Noubir… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
We develop a linearly constrained bimatrix game framework that can be used to model
many practical problems in many disciplines, including jamming in packetized wireless …

[PDF][PDF] Novel approaches to enhance mobile WiMAX security

T Shon, B Koo, JH Park, H Chang - EURASIP Journal on Wireless …, 2010 - Springer
Abstract The IEEE 802.16 Working Group on Broadband Wireless Access Standards
released IEEE 802.16-2004 which is a standardized technology for supporting broadband …

Efficient exploration of on-chip bus architectures and memory allocation

S Kim, C Im, S Ha - Proceedings of the 2nd IEEE/ACM/IFIP international …, 2004 - dl.acm.org
Separation between computation and communication in system design allows the system
designer to explore the communication architecture independently of component selection …

QoS-aware distributed security architecture for 4G multihop wireless networks

P Rengaraju, CH Lung… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Vehicular communications have received a great deal of attention in recent years due to the
demand for multimedia applications during travel and for improvements in safety. Safety …

Mobile WiMAX network security threats and solutions: A survey

VK Jatav, V Singh - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
IEEE 802.16 based WiMAX is an emerging wireless Internet technology. Salient features of
WiMAX such as high speed internet facility over a long distance, quality of service …

Evolution of cellular systems

S Shahabuddin, S Rahaman, F Rehman… - … Guide to 5G Security, 2018 - Wiley Online Library
This chapter covers the brief and comprehensive analysis of evolution of cellular systems
from 1st generation to 4th generation mobile cellular systems. It also covers the basic …