2021
DOI: 10.26599/tst.2020.9010020
|View full text |Cite
|
Sign up to set email alerts
|

A cross-layer cooperative jamming scheme for social internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 47 publications
(49 reference statements)
0
9
0
Order By: Relevance
“…Recently, jamming detection based on machine learning algorithms are popular [13]. In [14], Cross layer based jamming detection for IoT using artificial intelligence is explored. Jamming detection based on random forest, support vector machine, and neural network for 5G network is carried out in [15].…”
Section: Related Workmentioning
confidence: 99%
“…Recently, jamming detection based on machine learning algorithms are popular [13]. In [14], Cross layer based jamming detection for IoT using artificial intelligence is explored. Jamming detection based on random forest, support vector machine, and neural network for 5G network is carried out in [15].…”
Section: Related Workmentioning
confidence: 99%
“…In addition, the possibility of defects in the security design might multiply the numbers and type of the IoT devices. With so many linked IoT devices, any poorly protected online device may impair remote and global Internet safety and resilience [83]. For instance, a malware-infected unprotected refrigerator or television (TV) in the US can send thousands of spam emails to the world via the homeowners' Wi-Fi network [14].…”
Section: Iot Implementation Challengesmentioning
confidence: 99%
“…Elliptic curve cipher is recognized as the most secure encryption algorithm for a given length of secret key; it is profoundly influencing the technological development of industrial IoT such as intelligent monitoring [25], data flow management [26], and data prediction [27]. Elliptic curve cipher is a public key encryption algorithm based on the elliptic curve.…”
Section: Elliptic Curve Codementioning
confidence: 99%