-
1
-
-
84904393871
-
Survey on mobile social net-working in proximity (MSNP): Approaches, challenges and architecture
-
Aug.
-
Y.Wang, A. V. Vasilakos, Q. Jin, and J. Ma, "Survey on mobile social net-working in proximity (MSNP): Approaches, challenges and architecture," Wireless Netw., vol. 20, no. 6, pp. 1295-1311, Aug. 2014.
-
(2014)
Wireless Netw.
, vol.20
, Issue.6
, pp. 1295-1311
-
-
Wang, Y.1
Vasilakos, A.V.2
Jin, Q.3
Ma, J.4
-
2
-
-
84924871754
-
Social on the road: Enabling secure and efficient social networking on highways
-
Feb.
-
T. H. Luan, R. Lu, X. Shen, and F. Bai, "Social on the road: Enabling secure and efficient social networking on highways," IEEE Wireless Commun., vol. 22, no. 1, pp. 44-51, Feb. 2015.
-
(2015)
IEEE Wireless Commun.
, vol.22
, Issue.1
, pp. 44-51
-
-
Luan, T.H.1
Lu, R.2
Shen, X.3
Bai, F.4
-
3
-
-
84941242313
-
Reliable multicasting service for densely deployed military sensor networks
-
W. Na, N.-N. Dao, and S. Cho, "Reliable multicasting service for densely deployed military sensor networks," Int. J. Distrib. Sensor Netw., vol. 11, no. 8, p. 341912, 2015.
-
(2015)
Int. J. Distrib. Sensor Netw.
, vol.11
, Issue.8
, pp. 341912
-
-
Na, W.1
Dao, N.-N.2
Cho, S.3
-
4
-
-
84963960500
-
Mitigating WiFi interference to improve throughput for in-vehicle infotainment networks
-
Feb.
-
W. Na, N.-N. Dao, and S. Cho, "Mitigating WiFi interference to improve throughput for in-vehicle infotainment networks," IEEE Wireless Com-mun., vol. 23, no. 1, pp. 22-28, Feb. 2016.
-
(2016)
IEEE Wireless Com-mun.
, vol.23
, Issue.1
, pp. 22-28
-
-
Na, W.1
Dao, N.-N.2
Cho, S.3
-
5
-
-
84983338560
-
Using social Internet of Things (SIoT) demand side management on the plant
-
Jul.
-
J. Eom et al., "Using social Internet of Things (SIoT) demand side management on the plant," in Proc. IEEE Int. Conf. Ubiquitous Future Netw. (ICUFN), Jul. 2016, pp. 685-687.
-
(2016)
Proc. IEEE Int. Conf. Ubiquitous Future Netw. (ICUFN)
, pp. 685-687
-
-
Eom, J.1
-
6
-
-
85027285834
-
Adaptive MCS selection and resource planning for energy-efficient communication in LTE-M based IoT sensing platform
-
N.-N. Dao, M. Park, J. Kim, and S. Cho, "Adaptive MCS selection and resource planning for energy-efficient communication in LTE-M based IoT sensing platform," PLoS ONE, vol. 12, no. 8, p. e0182527, 2017.
-
(2017)
PLoS ONE
, vol.12
, Issue.8
, pp. e0182527
-
-
Dao, N.-N.1
Park, M.2
Kim, J.3
Cho, S.4
-
7
-
-
85040160048
-
-
IEEE Standard P802.15 TG8 standardization, Doc#: 15-12-0684-00-0008
-
E. Zeira, Q. Li, and S. Jin, The PAC Application Matrix, IEEE Standard P802.15 TG8 standardization, Doc#: 15-12-0684-00-0008, 2012.
-
(2012)
The PAC Application Matrix
-
-
Zeira, E.1
Li, Q.2
Jin, S.3
-
8
-
-
84983027871
-
Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks
-
N.-N. Dao, J. Kim, M. Park, and S. Cho, "Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks," PLoS ONE, vol. 11, no. 8, p. e0160375, 2016.
-
(2016)
PLoS ONE
, vol.11
, Issue.8
, pp. e0160375
-
-
Dao, N.-N.1
Kim, J.2
Park, M.3
Cho, S.4
-
9
-
-
85029601469
-
Adaptive resource balancing for serviceability maximization in fog radio access networks
-
N.-N. Dao et al., "Adaptive resource balancing for serviceability maximization in fog radio access networks," IEEE Access, vol. 5, pp. 14548-14559, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 14548-14559
-
-
Dao, N.-N.1
-
10
-
-
84900414638
-
Device-to-device communications in cellular networks
-
Apr.
-
D. Feng, L. Lu, Y. Yuan-Wu, G. Li, S. Li, and G. Feng, "Device-to-device communications in cellular networks," IEEE Commun. Mag., vol. 52, no. 4, pp. 49-55, Apr. 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.4
, pp. 49-55
-
-
Feng, D.1
Lu, L.2
Yuan-Wu, Y.3
Li, G.4
Li, S.5
Feng, G.6
-
11
-
-
85040159940
-
-
IEEE Standard P802.15 TG8 Standardization, Doc#: 15-16-0113-01-0008
-
Official Draft of IEEE 802.15.8 PAC D0.18.0, IEEE Standard P802.15 TG8 Standardization, Doc#: 15-16-0113-01-0008, 2016.
-
(2016)
Official Draft of IEEE 802.15.8 PAC D0.18.0
-
-
-
12
-
-
85040160163
-
-
Accessed: Jun. 20, [Online]
-
IEEE 802.15.8 Document Repository. Accessed: Jun. 20, 2017. [Online]. Available: https://mentor.ieee.org/802.15/documents?is-group=0008
-
(2017)
IEEE 802.15.8 Document Repository
-
-
-
13
-
-
85028079848
-
Trend analyses of authentication in peer aware communication (PAC)
-
Jul.
-
Y. Kim, N.-N. Dao, J. Lee, and S. Cho, "Trend analyses of authentication in peer aware communication (PAC)," in Proc. IEEE Int. Conf. Ubiquitous Future Netw. (ICUFN), Jul. 2017, pp. 1053-1055.
-
(2017)
Proc. IEEE Int. Conf. Ubiquitous Future Netw. (ICUFN)
, pp. 1053-1055
-
-
Kim, Y.1
Dao, N.-N.2
Lee, J.3
Cho, S.4
-
14
-
-
85040160413
-
-
IEEE Standard P802.15 TG8 Standardization, Doc#: 15-15-0254-00-0008
-
W. Na and S. Cho, MAC Security for IEEE 802.15.8 PAC, IEEE Standard P802.15 TG8 Standardization, Doc#: 15-15-0254-00-0008, 2015.
-
(2015)
MAC Security for IEEE 802.15.8 PAC
-
-
Na, W.1
Cho, S.2
-
15
-
-
85040160408
-
-
IEEE Standard P802.15 TG8 Standardization, Doc#: 15-16-0696-00-0008
-
B. Kwak and N. Song, Fixed Equations for PHY Security, IEEE Standard P802.15 TG8 Standardization, Doc#: 15-16-0696-00-0008, 2016.
-
(2016)
Fixed Equations for PHY Security
-
-
Kwak, B.1
Song, N.2
-
16
-
-
40949152760
-
Password authentication schemes: Current status and key issues
-
C.-S. Tsai, C.-C. Lee, and M.-S. Hwang, "Password authentication schemes: Current status and key issues," Int. J. Netw. Secur., vol. 3, no. 2, pp. 101-115, 2006.
-
(2006)
Int. J. Netw. Secur.
, vol.3
, Issue.2
, pp. 101-115
-
-
Tsai, C.-S.1
Lee, C.-C.2
Hwang, M.-S.3
-
17
-
-
84933522482
-
Physical layer key generation in wireless networks: Chal-lenges and opportunities
-
Jun.
-
K. Zeng, "Physical layer key generation in wireless networks: Chal-lenges and opportunities," IEEE Commun. Mag., vol. 53, no. 6, pp. 33-39, Jun. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 33-39
-
-
Zeng, K.1
-
18
-
-
84969980315
-
A survey on security in D2D communications
-
Apr.
-
M. Wang and Z. Yan, "A survey on security in D2D communications," Mobile Netw. Appl., vol. 22, no. 2, pp. 195-208, Apr. 2017.
-
(2017)
Mobile Netw. Appl.
, vol.22
, Issue.2
, pp. 195-208
-
-
Wang, M.1
Yan, Z.2
-
19
-
-
84997497763
-
A survey on device-to-device (D2D) communication: Architecture and security issues
-
Jan.
-
P. Gandotra, R. K. Jha, and S. Jain, "A survey on device-to-device (D2D) communication: Architecture and security issues," J. Netw. Comput. Appl., vol. 78, pp. 9-26, Jan. 2017.
-
(2017)
J. Netw. Comput. Appl.
, vol.78
, pp. 9-26
-
-
Gandotra, P.1
Jha, R.K.2
Jain, S.3
-
20
-
-
84905103355
-
Security in wireless ad-hoc networks-A survey
-
Sep.
-
R. Di Pietro, S. Guarino, N. V. Verde, and J. Domingo-Ferrer, "Security in wireless ad-hoc networks-A survey," Comput. Commun., vol. 51, pp. 1-20, Sep. 2014.
-
(2014)
Comput. Commun.
, vol.51
, pp. 1-20
-
-
Di Pietro, R.1
Guarino, S.2
Verde, N.V.3
Domingo-Ferrer, J.4
-
21
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
Oct.
-
C. C. Wu, W. B. Lee, and W.-J. Tsaur, "A secure authentication scheme with anonymity for wireless communications," IEEE Commun. Lett., vol. 12, no. 10, pp. 722-723, Oct. 2008.
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.-J.3
-
22
-
-
84868231183
-
Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks
-
I. Butun, Y. Wang, Y.-S. Lee, and R. Sankar, "Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks," Int. J. Security Netw., vol. 7, no. 2, pp. 107-121, 2012.
-
(2012)
Int. J. Security Netw.
, vol.7
, Issue.2
, pp. 107-121
-
-
Butun, I.1
Wang, Y.2
Lee, Y.-S.3
Sankar, R.4
-
23
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
D. He, Y. Gao, S. Chan, C. Chen, and J. Bu, "An enhanced two-factor user authentication scheme in wireless sensor networks," Ad Hoc Sensor Wireless Netw., vol. 10, no. 4, pp. 361-371, 2010.
-
(2010)
Ad Hoc Sensor Wireless Netw.
, vol.10
, Issue.4
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
24
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Mar.
-
M. L. Das, "Two-factor user authentication in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1086-1090, Mar. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
26
-
-
84911875895
-
A survey of key distribution in wireless sensor networks
-
C.-Y. Chen and H.-C. Chao, "A survey of key distribution in wireless sensor networks," Security Commun. Netw., vol. 7, no. 12, pp. 2495-2508, 2014.
-
(2014)
Security Commun. Netw.
, vol.7
, Issue.12
, pp. 2495-2508
-
-
Chen, C.-Y.1
Chao, H.-C.2
-
27
-
-
84945429312
-
A survey on lightweight entity authentication with strong PUFs
-
J. Delvaux, R. Peeters, D. Gu, and I. Verbauwhede, "A survey on lightweight entity authentication with strong PUFs," ACM Comput. Surv., vol. 48, no. 2, 2015, Art. no. 26.
-
(2015)
ACM Comput. Surv.
, vol.48
, Issue.2
-
-
Delvaux, J.1
Peeters, R.2
Gu, D.3
Verbauwhede, I.4
-
28
-
-
84949923109
-
Secure key establishment for device-to-device communications
-
Dec.
-
W. Shen, W. Hong, X. Cao, B. Yin, D. M. Shila, and Y. Cheng, "Secure key establishment for device-to-device communications," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2014, pp. 336-340.
-
(2014)
Proc. IEEE Global Commun. Conf. (GLOBECOM)
, pp. 336-340
-
-
Shen, W.1
Hong, W.2
Cao, X.3
Yin, B.4
Shila, D.M.5
Cheng, Y.6
-
30
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
31
-
-
0029720059
-
Diffie-Hellman key distribution extended to group communication
-
M. Steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman key distribution extended to group communication," in Proc. ACM Conf. Comput. Com-mun. Secur., 1996, pp. 31-37.
-
(1996)
Proc. ACM Conf. Comput. Com-mun. Secur.
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
32
-
-
84903511156
-
Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks
-
Jul.
-
W.-B. Hsieh and J.-S. Leu, "Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks," Wireless Commun. Mobile Comput., vol. 14, no. 10, pp. 995-1006, Jul. 2014.
-
(2014)
Wireless Commun. Mobile Comput.
, vol.14
, Issue.10
, pp. 995-1006
-
-
Hsieh, W.-B.1
Leu, J.-S.2
-
33
-
-
84989854376
-
A quantum Diffie-Hellman protocol
-
Jan.
-
P. Subramaniam and A. Parakh, "A quantum Diffie-Hellman protocol," Int. J. Secur. Netw., vol. 11, no. 4, pp. 213-223, Jan. 2016.
-
(2016)
Int. J. Secur. Netw.
, vol.11
, Issue.4
, pp. 213-223
-
-
Subramaniam, P.1
Parakh, A.2
-
34
-
-
84954137569
-
Imperfect forward secrecy: How Diffie-Hellman fails in practice
-
e, L. Valenta
-
D. Adrian et al., "e, L. Valenta, "Imperfect forward secrecy: How Diffie-Hellman fails in practice," in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2015, pp. 5-17.
-
(2015)
Proc. ACM SIGSAC Conf. Comput. Commun. Secur.
, pp. 5-17
-
-
Adrian, D.1
-
35
-
-
0029234878
-
Unconventional cryp-tographic keying variable management
-
Jan.
-
J. E. Hershey, A. A. Hassan, and R. Yarlagadda, "Unconventional cryp-tographic keying variable management," IEEE Trans. Commun., vol. 43, no. 1, pp. 3-6, Jan. 1995.
-
(1995)
IEEE Trans. Commun.
, vol.43
, Issue.1
, pp. 3-6
-
-
Hershey, J.E.1
Hassan, A.A.2
Yarlagadda, R.3
-
36
-
-
72249083097
-
High-rate uncorre-lated bit extraction for shared secret key generation from channel mea-surements
-
Jan.
-
N. Patwari, J. Croft, S. Jana, and S. K. Kasera, "High-rate uncorre-lated bit extraction for shared secret key generation from channel mea-surements," IEEE Trans. Mobile Comput., vol. 9, no. 1, pp. 17-30, Jan. 2010.
-
(2010)
IEEE Trans. Mobile Comput.
, vol.9
, Issue.1
, pp. 17-30
-
-
Patwari, N.1
Croft, J.2
Jana, S.3
Kasera, S.K.4
-
37
-
-
77953297543
-
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
-
Mar.
-
K. Zeng, D.Wu, A. Chan, and P. Mohapatra, "Exploiting multiple-antenna diversity for shared secret key generation in wireless networks," in Proc. IEEE Conf. Inf. Commun. (INFOCOM), Mar. 2010, pp. 1837-1845.
-
(2010)
Proc. IEEE Conf. Inf. Commun. (INFOCOM)
, pp. 1837-1845
-
-
Zeng, K.1
Wu, D.2
Chan, A.3
Mohapatra, P.4
-
38
-
-
84867755583
-
Limitations of generating a secret key using wireless fading under active adversary
-
Oct.
-
M. Zafer, D. Agrawal, and M. Srivatsa, "Limitations of generating a secret key using wireless fading under active adversary," IEEE/ACMTrans. Netw., vol. 20, no. 5, pp. 1440-1451, Oct. 2012.
-
(2012)
IEEE/ACMTrans. Netw.
, vol.20
, Issue.5
, pp. 1440-1451
-
-
Zafer, M.1
Agrawal, D.2
Srivatsa, M.3
-
39
-
-
84941248397
-
Fully distributed multicast routing protocol for IEEE 802.15.8 peer-aware communication
-
W. Na, Y. Lee, J. Yoon, J. Park, and S. Cho, "Fully distributed multicast routing protocol for IEEE 802.15.8 peer-aware communication," Int. J. Distrib. Sensor Netw., vol. 11, no. 8, p. 531710, 2015.
-
(2015)
Int. J. Distrib. Sensor Netw.
, vol.11
, Issue.8
, pp. 531710
-
-
Na, W.1
Lee, Y.2
Yoon, J.3
Park, J.4
Cho, S.5
-
40
-
-
84939986391
-
Recommendations in location-based social networks: A survey
-
Jul.
-
J. Bao, Y. Zheng, D. Wilkie, and M. Mokbel, "Recommendations in location-based social networks: A survey," GeoInformatica, vol. 19, no. 3, pp. 525-565, Jul. 2015.
-
(2015)
GeoInformatica
, vol.19
, Issue.3
, pp. 525-565
-
-
Bao, J.1
Zheng, Y.2
Wilkie, D.3
Mokbel, M.4
-
41
-
-
84922001255
-
Social context-aware trust inference for trust enhancement in social network based recommendations on service providers
-
Jan.
-
Y. Wang, L. Li, and G. Liu, "Social context-aware trust inference for trust enhancement in social network based recommendations on service providers," World Wide Web, vol. 18, no. 1, pp. 159-184, Jan. 2015.
-
(2015)
World Wide Web
, vol.18
, Issue.1
, pp. 159-184
-
-
Wang, Y.1
Li, L.2
Liu, G.3
-
42
-
-
85040160364
-
-
Accessed: Jul. 23, [Online]
-
OPNET Modeler 14.5. Accessed: Jul. 23, 2017. [Online]. Available: https://www.opnet.com
-
(2017)
OPNET Modeler 14.5
-
-
|