Edge computing-based Internet of Vehicles (EC-IoV) has emerged when computing environment is extended to vehicular network edge for supporting compute-intensive applications.
Xumin Huang, Rong Yu, Miao Pan, Lei Shu
doaj +1 more source
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security.
Hanzo, Lajos +3 more
core +1 more source
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta +73 more
core +1 more source
Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay [PDF]
13 pages, 8 figures, submitted for possible journal ...
Yong Zeng, Rui Zhang
openaire +2 more sources
Covert Surveillance via Proactive Eavesdropping Under Channel Uncertainty
28 pages, 10 ...
Cheng, Zihao +4 more
openaire +2 more sources
Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection [PDF]
In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS ...
Duy, Tran Trung +4 more
core +1 more source
SBVLC:Secure Barcode-based Visible Light Communication for Smartphones [PDF]
2D barcodes have enjoyed a significant penetration rate in mobile applications. This is largely due to the extremely low barrier to adoption – almost every camera-enabled smartphone can scan 2D barcodes.
Fu, Xinwen +4 more
core +1 more source
Development of an integrated remote monitoring technique and its application to para-stressing bridge system [PDF]
Bridge monitoring system via information technology is capable of providing more accurate knowledge of bridge performance characteristics than traditional strategies. This paper describes not only an integrated Internet monitoring system that consists of
Casas Rius, Joan Ramon +2 more
core +2 more sources
Passive security threats and consequences in IEEE 802.11 wireless mesh networks [PDF]
The Wireless Mesh Network (WMN) is ubiquitous emerging broadband wireless network. However, the open wireless medium, multi-hop multi-radio architecture and ad-hoc connectivity amongst end-users are such characteristics which increases the ...
Khan, S, Loo, KK, Mast, N, Silahuddin, A
core
Phoneme-Based Proactive Anti-Eavesdropping With Controlled Recording Privilege
Comment: 14 pages, 28 figures; submitted to IEEE ...
Peng Huang +7 more
openaire +2 more sources

