4.6 Review

Blockchain for Future Wireless Networks: A Decade Survey

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

Novel Multi Security and Privacy Benchmarking Framework for Blockchain-Based IoT Healthcare Industry 4.0 Systems

Sarah Qahtan et al.

Summary: This article introduces a method for evaluating blockchain-based IoT healthcare Industry 4.0 systems based on multi-criteria decision-making. By using fuzzy weighting and spherical fuzzy sets, the security and privacy properties are weighted, and the systems are ranked using grey relational analysis-technique for order of preference by similarity to ideal solution and the bald eagle search optimization method. The results of the study indicate that access control is the most important security property, while integrity is the least important.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Engineering, Electrical & Electronic

The Secrecy Comparison of RF and FSO Eavesdropping Attacks in Mixed RF-FSO Relay Networks

Eylem Erdogan et al.

Summary: This paper studies the secrecy performance of mixed RF-FSO systems, taking into account both RF and FSO eavesdropper attacks. By deriving the secrecy outage probability and the probability of positive secrecy capacity performance, the study highlights the importance of the location and size of the photo-aperture in enhancing the secrecy performance of RF-FSO relay networks.

IEEE PHOTONICS JOURNAL (2022)

Review Computer Science, Information Systems

Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions

Alfredo J. Perez et al.

Summary: The development of Blockchain and smart contracts enables the automation of commerce in crowdsensing systems. However, security and privacy issues need to be addressed.

COMPUTER SCIENCE REVIEW (2022)

Article Computer Science, Hardware & Architecture

A hybrid blockchain method in internet of things for privacy and security in unmanned aerial vehicles network

Emad H. Abualsauod

Summary: Unmanned Aerial Vehicles (UAVs) integrated with the Internet of Things (IoT) have great potential in various fields, but face security and reliability challenges. This research proposes an optimal solution for these challenges by combining blockchain-based technologies with multiple methods, and verifies its effectiveness and improvement in experiments.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Computer Science, Theory & Methods

Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy

Jayapriya Jayabalan et al.

Summary: Traditional healthcare systems use centralized client-server architecture to store and process patient-health related information. This paper proposes a blockchain-based framework integrated with InterPlanetary File System (IPFS) to secure storage, sharing and retrieval of Electronic Health Records (EHR). The framework ensures fail-safe and tamper-proof healthcare ledgers, with multiple layers of security and encryption techniques.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2022)

Article Multidisciplinary Sciences

A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system

Zhaohan Li et al.

Summary: In this paper, a blockchain-based identity authentication scheme for Intelligent Electronic Devices (IEDs) of Security and Stability Control System (SSCS) is proposed. The scheme uses a consortium chain to store credentials and combines IP address, port number, and physical ID for unique identification of IEDs. It also introduces a lightweight identity authentication method using renewable hash chains.

PLOS ONE (2022)

Article Computer Science, Information Systems

Stop Deceiving! An Effective Defense Scheme Against Voice Impersonation Attacks on Smart Devices

Wenbin Huang et al.

Summary: The research aims to propose a universal defense scheme against voice impersonation attacks, based on the VI data set collected from the TV show "The Sound". Results indicate that the proposed QGD scheme outperforms other state-of-the-art schemes in terms of accuracy.

IEEE INTERNET OF THINGS JOURNAL (2022)

Review Telecommunications

Security of Vehicular Ad Hoc Networks using blockchain: A comprehensive review

Jyoti Grover

Summary: The most advanced component of an intelligent transportation system is the vehicular ad hoc network (VANET), which enables communication among vehicles and road side units. However, security and privacy issues need to be addressed before VANET can be fully adopted. Blockchain, as a decentralized computing platform, offers transparency, tamper resistance, and immutability, making it an expedient solution for VANET security.

VEHICULAR COMMUNICATIONS (2022)

Article Computer Science, Information Systems

Coalition Game and Blockchain-Based Optimal Data Pricing Scheme for Ride Sharing Beyond 5G

Riya Kakkar et al.

Summary: This article introduces a secure and reliable data pricing scheme based on blockchain and coalition game theory for ride sharing, focusing on data sharing between vehicle owners and customers. It utilizes beyond fifth-generation (5G) communication network to provide low latency, high throughput, and high availability communication. By using coalition game theory, the scheme aims to optimize the payoff of vehicle owners and customers through forming coalitions, demonstrating efficiency and benefits in terms of network latency, throughput, and profit.

IEEE SYSTEMS JOURNAL (2022)

Article Computer Science, Information Systems

Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey

Hossein Pirayesh et al.

Summary: This article surveys existing jamming attacks and anti-jamming strategies in various wireless networks, aiming to provide a comprehensive understanding of the current landscape and stimulate further research efforts to secure wireless networks against jamming attacks.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2022)

Article Computer Science, Information Systems

Blockchain-Based Federated Learning in UAVs Beyond 5G Networks: A Solution Taxonomy and Future Directions

Deepti Saraswat et al.

Summary: This paper introduces the application of blockchain-based federated learning in UAV networks. By training data on local nodes, data privacy can be protected and network communication can be improved. In addition, a blockchain-based federated learning scheme is proposed to achieve trusted data exchange among UAV swarms and ground stations. The survey also provides a logistics case study of blockchain-based federated learning-oriented UAV networks.

IEEE ACCESS (2022)

Article Engineering, Electrical & Electronic

Towards 6G-Enabled Internet of Vehicles: Security and Privacy

Diana Pamela Moya Osorio et al.

Summary: This paper discusses the crucial role of 6G in the realization of intelligent transportation systems and smart city concepts, as well as how promising technologies such as artificial intelligence, network softwarisation, and blockchain can provide security and privacy protection.

IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY (2022)

Article Computer Science, Information Systems

Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment

Basudeb Bera et al.

Summary: In this paper, a novel access control scheme for unauthorized UAV detection and mitigation, called ACSUD-IoD, is proposed. By incorporating a blockchain-based solution in ACSUD-IoD, the data from drones can be securely stored for detection of unauthorized UAVs, and Big data analytics can be performed on the authenticated transactional data stored in the blockchain to ensure data authenticity and effectiveness. The detailed security analysis and testbed experiments demonstrate the robustness and efficacy of the proposed scheme in an IoD environment compared to existing schemes.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Information Systems

Modeling and Detection of Flooding-Based Denial-of-Service Attack in Wireless Ad Hoc Network Using Bayesian Inference

N. Nishanth et al.

Summary: Wireless ad hoc networks are crucial in disaster situations, but are vulnerable to various attacks due to lack of centralized management and secure boundaries. The algorithm proposed in the article, based on Bayesian inference, can effectively defend against flooding-based DoS attacks with high detection accuracy and extremely low false detection rate.

IEEE SYSTEMS JOURNAL (2021)

Article Computer Science, Hardware & Architecture

Survey on blockchain based smart contracts: Applications, opportunities and challenges

Tharaka Hewa et al.

Summary: Blockchain and smart contract technologies have brought improvements and optimizations to previously complex applications, revolutionizing functionality. The paper discusses applications that have already benefited from smart contracts and highlights the future potential of blockchain-based smart contracts in these areas.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Computer Science, Theory & Methods

A scalable blockchain based trust management in VANET routing protocol

Sowmya Kudva et al.

Summary: Internal attacks on VANET may have negative impacts on network performance, requiring effective solutions. This study proposes a blockchain-based decentralized trust score framework, which effectively prevents and blacklists potential insider attackers through a two-level detection system, enhancing VANET performance.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2021)

Review Engineering, Electrical & Electronic

A survey: applications of blockchain in the Internet of Vehicles

Chao Wang et al.

Summary: Blockchain technology has revolutionized the cryptocurrency field and gained research interest in areas like the Internet of Vehicles. An analysis of blockchain applications in the IoV reveals its potential to address centralized issues and enhance security.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2021)

Article Computer Science, Hardware & Architecture

Blockchain-Envisioned Softwarized Multi-Swarming UAVs to Tackle COVID-I9 Situations

Rajesh Gupta et al.

Summary: With the spread of novel coronavirus, concerns about global health have increased, prompting the proposal of using 5G multi-swarm UAVs to handle disease containment. A blockchain-envisioned softwarized multi-swarming UAV communication scheme based on a 6G network is suggested to achieve intelligent connectivity and data security, showing superior performance compared to existing systems.

IEEE NETWORK (2021)

Article Engineering, Multidisciplinary

BATS: A Blockchain and AI-Empowered Drone-Assisted Telesurgery System Towards 6G

Rajesh Gupta et al.

Summary: The BATS system proposed in this paper is a remote surgery system based on blockchain and AI, which can classify diseases and transport medical supplies using drones in emergency situations, demonstrating better performance compared to traditional schemes.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Computer Science, Information Systems

Security and Privacy of Patient Information in Medical Systems Based on Blockchain Technology

Hongjiao Wu et al.

Summary: In this article, a method to protect private information in medical systems using blockchain technology is designed, incorporating the Patient-oriented Privacy Preserving Access Control model and file authorization contracts to ensure the security of private information. Simulation results demonstrate strong performance in information storage and transmission efficiency of the method.

ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2021)

Article Computer Science, Hardware & Architecture

6G-enabled Edge Intelligence for Ultra -Reliable Low Latency Applications: Vision and Mission

Rajesh Gupta et al.

Summary: This article discusses the advantages of edge computing over cloud computing, as well as the innovative application of using 6G wireless networks to solve connectivity issues with 4G and 5G. Through a case study, it is demonstrated that 6G-based edge intelligence has lower latency compared to 4G and 5G communication networks.

COMPUTER STANDARDS & INTERFACES (2021)

Article Computer Science, Information Systems

n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks

Susil Kumar Mohanty et al.

Summary: This work introduces a secure and privacy-preserving payment channel network protocol named n-HTLC, which allows payments without sending any information to intermediate users and proposes the kTLC protocol, compatible with the Sphinx onion packet format. Experimental results demonstrate that both n-HTLC and kTLC outperform other off-chain payment protocols in terms of computational and communication overhead.

COMPUTERS & SECURITY (2021)

Proceedings Paper Automation & Control Systems

Blockchain-Based Man-in-the-Middle (MITM) Attack Detection for Photovoltaic Systems

Jinchun Choi et al.

Summary: This paper proposes a blockchain-based MITM attack detection method for PV systems, which involves screening network data, network intrusion detection, and hash comparison to ensure data integrity during transit. The method is implemented in IoT security modules as clients of a blockchain network and validated through experiments.

2021 IEEE DESIGN METHODOLOGIES CONFERENCE (DMC) (2021)

Proceedings Paper Telecommunications

How DoS attacks can be mounted on Network Slice Broker and can they be mitigated using blockchain?

Tharaka Hewa et al.

Summary: This work discusses the potential use of network slice brokering mechanism for resource allocation in next generation networks, while addressing the risk of DoS attacks on Network Slice Broker (NSB). By introducing a Security Service Blockchain (SSB) solution, the latency impact under DoS attack scenarios was significantly reduced.

2021 IEEE 32ND ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC) (2021)

Article Computer Science, Information Systems

A Hybrid Deep Learning Approach for Replay and DDoS Attack Detection in a Smart City

Asmaa A. Elsaeidy et al.

Summary: Today's smart city infrastructure heavily relies on Internet of Things (IoT) technologies, which, while enabling service automation, also poses security risks. A hybrid deep learning model has been developed to detect replay and DDoS attacks in real life smart city platforms, demonstrating high accuracy rates on environmental, smart river, and smart soil datasets.

IEEE ACCESS (2021)

Proceedings Paper Computer Science, Hardware & Architecture

Wi-attack: Cross-technology Impersonation Attack against iBeacon Services

Xin Na et al.

Summary: This paper discusses the feasibility and execution of using WiFi devices to impersonate iBeacon services. Wi-attack, using digital emulation technology, can simulate multiple iBeacons for attacks simultaneously. Attack results show an average distance error of over 20 meters in fingerprint-based localization.

2021 18TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON) (2021)

Proceedings Paper Computer Science, Hardware & Architecture

4G Communication Technology Wireless Network Secure Communication

Qinghai Wu

Summary: With the advancement of science and technology, the widespread adoption of 4G communication technology has expanded the application of wireless networks, but also brought along security issues. The paper discusses secure communication based on 4G technology to prevent problems, provide assurance, and promote the steady development of the communication industry.

IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC) (2021)

Proceedings Paper Computer Science, Information Systems

6G Security Challenges and Potential Solutions

Pawani Porambage et al.

Summary: This article investigates how security may impact the envisioned 6G wireless systems, discussing potential challenges and solutions, with a focus on the security and privacy challenges that may arise with the requirements, novel technologies and network architecture of 6G.

2021 JOINT EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS & 6G SUMMIT (EUCNC/6G SUMMIT) (2021)

Proceedings Paper Engineering, Electrical & Electronic

A Research of MITM Attacks in Wi-Fi Networks Using Single-board Computer

Almaz Idiyatullin et al.

Summary: This article discusses the significance and implementation process of Man-In-the-Middle attack in computer security, proposes methods to counter the attack, and emphasizes the threat it poses to the security of Wi-Fi networks.

PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS) (2021)

Article Computer Science, Hardware & Architecture

Blockchain-Based Privacy Preservation for 5G-Enabled Drone Communications

Yulei Wu et al.

Summary: 5G-enabled drones have various potential applications in both military and civilian sectors, involving security and privacy concerns. Utilizing blockchain for privacy preservation is proposed in this article, along with a review of existing solutions, legislation, and challenges for future research.

IEEE NETWORK (2021)

Article Computer Science, Hardware & Architecture

Emerging Drone Trends for Blockchain-Based 5G Networks: Open Issues and Future Perspectives

Tao Han et al.

Summary: Unmanned aerial vehicles, or drones, have sparked increasing research interest due to their ability to carry multiple sensors and connect to mobile networks, but face challenges in computational resources, reliable connections, and high data transmission rates. This work explores 5G communication networks and mobile edge computing as promising technologies for drones, addresses new security concerns, and proposes blockchain technology as a novel security solution. The article also surveys contributions utilizing these technologies to enhance the drone industry, and discusses open issues and future prospects.

IEEE NETWORK (2021)

Review Multidisciplinary Sciences

Blockchain-enabled wireless communications: a new paradigm towards 6G

Jiaheng Wang et al.

Summary: Research on 6G wireless communications has begun with the deployment of 5G networks worldwide, but trust-related issues are impeding the achievement of goals. Blockchain technology, with its decentralized and transparent nature, provides a solution for establishing cooperative trust among separate network entities and presents a new paradigm for 6G networks.

NATIONAL SCIENCE REVIEW (2021)

Article Computer Science, Information Systems

Optimal Jamming Attack System Against Remote State Estimation in Wireless Network Control Systems

Li Yang et al.

Summary: This study establishes an attack system through the evaluation model of sensor, time allocation of jamming attack, and attack rules. Experimental results show that the good-sensor-late-attack strategy has the best effect.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

SmartBlock-SDN: An Optimized Blockchain-SDN Framework for Resource Management in IoT

Anichur Rahman et al.

Summary: SDN and Blockchain technologies provide a robust and reliable platform for secure network communication in the IoT ecosystem. This research proposes a hierarchical architecture for a distributed yet efficient Blockchain-enabled SDN-IoT framework, ensuring efficient cluster-head selection and secure network communication by identifying and isolating rogue switches. The proposed framework demonstrates optimized energy-utilization, end-to-end delay, and throughput in simulation, achieving efficiency and security in smart networks.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap

Mohammad Wazid et al.

Summary: 5G mobile communication systems have enabled the interconnection of not only people but also machines and devices. The IoT communication environment supported by 5G enables a wide variety of applications, but also faces various security and privacy issues. Protecting the infrastructure of 5G-enabled IoT communication environment against attacks is crucial, necessitating the proposal of various security protocols by researchers.

IEEE ACCESS (2021)

Article Computer Science, Hardware & Architecture

Blockchain for cloud exchange: A survey

Shaoan Xie et al.

COMPUTERS & ELECTRICAL ENGINEERING (2020)

Article Computer Science, Hardware & Architecture

Securing Smart Cities through Blockchain Technology: Architecture, Requirements, and Challenges

Saqib Hakak et al.

IEEE NETWORK (2020)

Article Engineering, Electrical & Electronic

MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks

Hyo Jin Jo et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Hardware & Architecture

Human Arthritis Analysis in Fog Computing Environment Using Bayesian Network Classifier and Thread Protocol

Sudeep Tanwar et al.

IEEE CONSUMER ELECTRONICS MAGAZINE (2020)

Article Computer Science, Information Systems

HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes

Chao Lin et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Review Computer Science, Hardware & Architecture

Blockchain for 5G and beyond networks: A state of the art survey

Dinh C. Nguyen et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Information Systems

A Blockchain-Based Trust Management With Conditional Privacy-Preserving Announcement Scheme for VANETs

Xingchen Liu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

A blockchain-based smart home gateway architecture for preventing data forgery

Younghun Lee et al.

HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks

Muhammad Imran et al.

IEEE SYSTEMS JOURNAL (2020)

Article Automation & Control Systems

How Does CSMA/CA Affect the Performance and Security in Wireless Blockchain Networks

Bin Cao et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

RAFT Based Wireless Blockchain Networks in the Presence of Malicious Jamming

Hao Xu et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2020)

Article Computer Science, Hardware & Architecture

Blockchain-based secured event-information sharing protocol in internet of vehicles for smart cities

Sanjeev Kumar Dwivedi et al.

COMPUTERS & ELECTRICAL ENGINEERING (2020)

Review Computer Science, Hardware & Architecture

Blockchain-based security attack resilience schemes for autonomous vehicles in industry 4.0: A systematic review

Rajesh Gupta et al.

COMPUTERS & ELECTRICAL ENGINEERING (2020)

Article Computer Science, Hardware & Architecture

Blockchain for Digital Twins: Recent Advances and Future Research Challenges

Ibrar Yaqoob et al.

IEEE NETWORK (2020)

Article Computer Science, Hardware & Architecture

Blockchain-based identity management systems: A review

Yang Liu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Theory & Methods

Blockchain and AI amalgamation for energy cloud management: Challenges, solutions, and future directions

Aparna Kumari et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2020)

Proceedings Paper Computer Science, Theory & Methods

Lightweight Digital Signature Solution to Defend Micro Aerial Vehicles Against Man-In-The-Middle Attack

Yucheng Li et al.

2020 IEEE 23RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2020) (2020)

Proceedings Paper Computer Science, Information Systems

Review of Prevention schemes for Replay Attack in Vehicular Ad hoc Networks (VANETs)

Mahmood A. Al-shareeda et al.

2020 IEEE 3RD INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SIGNAL PROCESSING (ICICSP 2020) (2020)

Article Computer Science, Information Systems

An Improved Blockchain-Based Authentication Protocol for IoT Network Management

Mostafa Yavari et al.

SECURITY AND COMMUNICATION NETWORKS (2020)

Article Telecommunications

Blockchain-enabled resource management and sharing for 6G communications

Hao Xu et al.

DIGITAL COMMUNICATIONS AND NETWORKS (2020)

Article Computer Science, Information Systems

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges

Pooja Anand et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

When Blockchain Meets SGX: An Overview, Challenges, and Open Issues

Zijian Bao et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Adoption of blockchain technology in various realms: Opportunities and challenges

Shaik V. Akram et al.

SECURITY AND PRIVACY (2020)

Article Computer Science, Information Systems

A Survey on Decentralized Consensus Mechanisms for Cyber Physical Systems

Umesh Bodkhe et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

Rabia Khan et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Telecommunications

Security and privacy in 6G networks: New areas and new challenges

Minghao Wang et al.

DIGITAL COMMUNICATIONS AND NETWORKS (2020)

Article Computer Science, Information Systems

Smart Contract-Based Access Control for the Internet of Things

Yuanyu Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Review Engineering, Electrical & Electronic

Tactile internet and its applications in 5G era: A comprehensive review

Rajesh Gupta et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)

Article Computer Science, Information Systems

Security Attacks in Named Data Networking of Things and a Blockchain Solution

Konglin Zhu et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Telecommunications

Blockchain-based security aspects in heterogeneous Internet-of-Things networks: A survey

Fabiola Hazel Pohrmen et al.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2019)

Review Computer Science, Hardware & Architecture

Blockchain for smart communities: Applications, challenges and opportunities

Shubhani Aggarwal et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Information Systems

Survey on blockchain for Internet of Things

Xu Wang et al.

COMPUTER COMMUNICATIONS (2019)

Article Computer Science, Information Systems

Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives

Asad Ali Siyal et al.

CRYPTOGRAPHY (2019)

Article Computer Science, Information Systems

Dynamic Distributed Honeypot Based on Blockchain

Leyi Shi et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Modeling and Analysis of Eavesdropping Attack in 802.11 ad mmWave Wireless Networks

Sarankumar Balakrishnan et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Preventing Black Hole Attack in Wireless Sensor Network Using HMM

Hanane Kalkha et al.

SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2018) (2019)

Review Information Science & Library Science

A systematic literature review of blockchain-based applications: Current status, classification and open issues

Fran Casino et al.

TELEMATICS AND INFORMATICS (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Blockchain-based Remote Patient Monitoring in Healthcare 4.0

Jigna Hathaliya et al.

PROCEEDINGS OF THE 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC 2019) (2019)

Proceedings Paper Engineering, Electrical & Electronic

A Lightweight Blockchain based Two Factor Authentication Mechanism for LoRaWAN Join Procedure

Syed Muhammad Danish et al.

2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS) (2019)

Article Computer Science, Information Systems

Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets

Georgios Spathoulas et al.

FUTURE INTERNET (2019)

Article Computer Science, Information Systems

Security for 5G and Beyond

Ijaz Ahmad et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Review Computer Science, Hardware & Architecture

Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

Mohamed Amine Ferrag et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey

Limei He et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Security for 5G Mobile Wireless Networks

Dongfeng Fang et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique

Adwan Yasin et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)

Article Computer Science, Information Systems

Masquerading Attacks Detection in Mobile Ad Hoc Networks

Sohail Abbas et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN

Prashant Kumar et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2018)

Article Computer Science, Information Systems

BWManager: Mitigating Denial of Service Attacks in Software-Defined Networks Through Bandwidth Prediction

Tao Wang et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2018)

Proceedings Paper Computer Science, Theory & Methods

Design and Implementation of an OpenFlow-based TCP SYN Flood Mitigation

Ryosuke Nagai et al.

2018 6TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2018) (2018)

Article Computer Science, Information Systems

A systematic review on security issues in vehicular ad hoc network

Sudeep Tanwar et al.

SECURITY AND PRIVACY (2018)

Article Computer Science, Information Systems

Network layer attacks and countermeasures in cognitive radio networks: A survey

Mounia Bouabdellah et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2018)

Article Engineering, Electrical & Electronic

Price Modification Attack and Protection Scheme in Smart Grid

Subhankar Mishra et al.

IEEE TRANSACTIONS ON SMART GRID (2017)

Article Computer Science, Information Systems

SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks

Reza Mohammadi et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2017)

Article Computer Science, Information Systems

SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks

Reza Mohammadi et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Blockchain based Data Integrity Service Framework for IoT data

Bin Liu et al.

2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017) (2017)

Proceedings Paper Engineering, Electrical & Electronic

Towards Better Availability and Accountability for IoT Updates by means of a Blockchain

Aymen Boudguiga et al.

2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW) (2017)

Article Engineering, Electrical & Electronic

A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

Yulong Zou et al.

PROCEEDINGS OF THE IEEE (2016)

Proceedings Paper Engineering, Electrical & Electronic

MAC LAYER SECURITY ISSUES IN WIRELESS MESH NETWORKS

K. Ganesh Reddy et al.

PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS-2015) (2016)

Article Computer Science, Information Systems

A Survey on Security Aspects for LTE and LTE-A Networks

Jin Cao et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Hardware & Architecture

PHYSICAL LAYER SECURITY IN WIRELESS NETWORKS: A TUTORIAL

Yi-Sheng Shiu et al.

IEEE WIRELESS COMMUNICATIONS (2011)

Article Engineering, Electrical & Electronic

Network Access Security in Next-Generation 3GPP Systems: A Tutorial

C. B. Sankaran

IEEE COMMUNICATIONS MAGAZINE (2009)