2018
DOI: 10.3390/s18124257
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things

Abstract: Smart homes can improve the quality of life and be implemented by Internet of Things (IoT) technologies. However, security is a very important issue in smart homes. For this reason, we propose a secrecy transmission protocol for primary user (PU) by selecting friendly jammer in cognitive IoT model. In particular, a secondary transmitter (ST) is selected to transmit secondary signals by the PU’s frequency spectrum, while another ST is chosen to transmit artificial noise to protect the transmission confidentiali… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…Machine learning techniques help the devices to take context-based decisions and learn from their experiences. This leads to the creation of the term “Cognitive UIoT” [ 82 ]. Several studies have been carried out regarding the integration of machine learning mechanism with IoT and UAV.…”
Section: Open Issues and Research Challenges Of Mac Protocols For mentioning
confidence: 99%
“…Machine learning techniques help the devices to take context-based decisions and learn from their experiences. This leads to the creation of the term “Cognitive UIoT” [ 82 ]. Several studies have been carried out regarding the integration of machine learning mechanism with IoT and UAV.…”
Section: Open Issues and Research Challenges Of Mac Protocols For mentioning
confidence: 99%
“…In the security verification, the authors prove that the proposed design satisfies the security specifications and resists against different attacks. The physical-layer security for a cognitive Internet of things model is assessed in [7]. The authors propose a cooperative jammer selection transmission protocol to preserve the information of primary users against eavesdropping.…”
Section: A Review Of the Contributions In This Special Issuementioning
confidence: 99%