TY - STD TI - Abualhaol, I, Muegge S (2016) Securing d2d wireless links by continuous authenticity with legitimacy patterns In: 2016 49th Hawaii International Conference on System Sciences (HICSS), 5763–5771. https://doi.org/10.1109/HICSS.2016.713. ID - ref1 ER - TY - STD TI - Adem, N, Hamdaoui B, Yavuz A (2015) Pseudorandom time-hopping anti-jamming technique for mobile cognitive users In: 2015 IEEE Globecom Workshops (GC Wkshps), 1–6. https://doi.org/10.1109/GLOCOMW.2015.7414043. ID - ref2 ER - TY - JOUR AU - Adem, N. a. d. i. a. AU - Hamdaoui, B. e. c. h. i. r. AU - Yavuz, A. t. t. i. l. a. PY - 2016 DA - 2016// TI - Mitigating jamming attacks in mobile cognitive networks through time hopping JO - Wireless Communications and Mobile Computing VL - 16 UR - https://doi.org/10.1002/wcm.2745 DO - 10.1002/wcm.2745 ID - Adem2016 ER - TY - JOUR AU - AlDairi, A. PY - 2017 DA - 2017// TI - Cyber security attacks on smart cities and associated mobile technologies JO - Procedia Comput Sci VL - 109 UR - https://doi.org/10.1016/j.procs.2017.05.391 DO - 10.1016/j.procs.2017.05.391 ID - AlDairi2017 ER - TY - JOUR AU - Alavi, F. AU - Yamchi, N. M. AU - Javan, M. R. AU - Cumanan, K. PY - 2017 DA - 2017// TI - Limited feedback scheme for device-to-device communications in 5g cellular networks with reliability and cellular secrecy outage constraints JO - IEEE Trans Veh Technol VL - 66 UR - https://doi.org/10.1109/TVT.2017.2690521 DO - 10.1109/TVT.2017.2690521 ID - Alavi2017 ER - TY - JOUR AU - Alwan, H. AU - Agarwal, A. PY - 2013 DA - 2013// TI - A multipath routing approach for secure and reliable data delivery in wireless sensor networks JO - Int J Distrib Sens Netw VL - 9 UR - https://doi.org/10.1155/2013/232798 DO - 10.1155/2013/232798 ID - Alwan2013 ER - TY - STD TI - Bhattacharya, A, Audhya S, Sinha K (2016) An anti-jamming protocol based on secret reallocation of channels In: 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 154–159. https://doi.org/10.1109/RAIT.2016.7507893. ID - ref7 ER - TY - JOUR AU - Bhattacharya, A. AU - Ghosh, S. C. AU - Sinha, K. AU - Sinha, B. P. PY - 2018 DA - 2018// TI - Secure multipath routing for multimedia communication in cognitive radio networks JO - Int J Commun Netw Distrib Syst VL - 21 UR - https://doi.org/10.1504/IJCNDS.2018.093385 DO - 10.1504/IJCNDS.2018.093385 ID - Bhattacharya2018 ER - TY - JOUR AU - Ben-Othman, J. AU - Yahya, B. PY - 2010 DA - 2010// TI - Energy efficient and qos based routing protocol for wireless sensor networks JO - J Parallel Distrib Comput VL - 70 UR - https://doi.org/10.1016/j.jpdc.2010.02.010 DO - 10.1016/j.jpdc.2010.02.010 ID - Ben-Othman2010 ER - TY - STD TI - Borges, P, Sousa B, Ferreira L, Saghezchi FB, Mantas G, Ribeiro J, Rodriguez J, Cordeiro L, Simoes P (2017) Towards a hybrid intrusion detection system for android-based ppdr terminals In: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 1034–1039.. IEEE. https://doi.org/10.23919/inm.2017.7987434. ID - ref10 ER - TY - STD TI - Chen, R, Park JM (2006) Ensuring trustworthy spectrum sensing in cognitive radio networks In: Networking Technologies for Software Defined Radio Networks, 2006. SDR ’06.1st IEEE Workshop On, 110–119. https://doi.org/10.1109/SDR.2006.4286333. ID - ref11 ER - TY - JOUR AU - Chen, R. AU - Park, J. M. AU - Reed, J. H. PY - 2008 DA - 2008// TI - Defense against primary user emulation attacks in cognitive radio networks JO - IEEE J Sel Areas Commun VL - 26 UR - https://doi.org/10.1109/JSAC.2008.080104 DO - 10.1109/JSAC.2008.080104 ID - Chen2008 ER - TY - STD TI - Cikovskis, L, Slaidins I (2015) Path selection criteria for multi-path routing in wireless ad-hoc network In: 2015 Advances in Wireless and Optical Communications (RTUWO), 58–61. https://doi.org/10.1109/RTUWO.2015.7365720. ID - ref13 ER - TY - JOUR AU - Cumanan, K. AU - Xing, H. AU - Xu, P. AU - Zheng, G. AU - Dai, X. AU - Nallanathan, A. AU - Ding, Z. AU - Karagiannidis, G. K. PY - 2017 DA - 2017// TI - Physical layer security jamming: Theoretical limits and practical designs in wireless networks JO - IEEE Access VL - 5 UR - https://doi.org/10.1109/ACCESS.2016.2636239 DO - 10.1109/ACCESS.2016.2636239 ID - Cumanan2017 ER - TY - JOUR AU - Das, D. AU - Das, S. PY - 2013 DA - 2013// TI - Primary user emulation attack in cognitive radio networks: A survey JO - IRACST-International Journal of Computer Networks and Wireless Communications VL - 3 ID - Das2013 ER - TY - STD TI - Davies, VA, et al. (2000) Evaluating mobility models within an ad hoc network. Master’s thesis, Citeseer. ID - ref16 ER - TY - JOUR AU - Eisenbarth, T. AU - Kumar, S. AU - Paar, C. AU - Poschmann, A. AU - Uhsadel, L. PY - 2007 DA - 2007// TI - A survey of lightweight-cryptography implementations JO - IEEE Des Test Comput VL - 24 UR - https://doi.org/10.1109/MDT.2007.178 DO - 10.1109/MDT.2007.178 ID - Eisenbarth2007 ER - TY - STD TI - Faisal, M, Mathkoor H (2015) Sdtp: Secure data transmission protocol in ad hoc networks based on link-disjoint multipath routing In: 2015 2nd World Symposium on Web Applications and Networking (WSWAN), 1–5. https://doi.org/10.1109/WSWAN.2015.7210348. ID - ref18 ER - TY - JOUR AU - Fang, D. AU - Qian, Y. AU - Hu, R. Q. PY - 2018 DA - 2018// TI - Security for 5g mobile wireless networks JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2017.2779146 DO - 10.1109/ACCESS.2017.2779146 ID - Fang2018 ER - TY - JOUR AU - Fauzi, A. AU - Khan, A. PY - 2017 DA - 2017// TI - Threats advancement in primary user emulation attack and spectrum sensing data falsification (ssdf) attack in cognitive radio network (crn) for 5g wireless network environment JO - J Telecommun Electron Comput Eng (JTEC) VL - 9 ID - Fauzi2017 ER - TY - STD TI - Ganjali, Y, Keshavarzian A (2004) Load balancing in ad hoc networks: single-path routing vs. multi-path routing In: IEEE INFOCOM 2004, 1120–1125.. IEEE. https://doi.org/10.1109/infcom.2004.1356998. ID - ref21 ER - TY - JOUR AU - Ge, X. i. a. o. h. u. AU - Cheng, H. u. i. AU - Guizani, M. o. h. s. e. n. AU - Han, T. a. o. PY - 2014 DA - 2014// TI - 5G wireless backhaul networks: challenges and research advances JO - IEEE Network VL - 28 UR - https://doi.org/10.1109/MNET.2014.6963798 DO - 10.1109/MNET.2014.6963798 ID - Ge2014 ER - TY - JOUR AU - Gharaibeh, A. AU - Salahuddin, M. A. AU - Hussini, S. J. AU - Khreishah, A. AU - Khalil, I. AU - Guizani, M. AU - Al-Fuqaha, A. PY - 2017 DA - 2017// TI - Smart cities: A survey on data management, security, and enabling technologies JO - IEEE Commun Surv Tutor VL - 19 UR - https://doi.org/10.1109/COMST.2017.2736886 DO - 10.1109/COMST.2017.2736886 ID - Gharaibeh2017 ER - TY - JOUR AU - Huifang, C. AU - Lei, X. AU - Xiong, N. PY - 2014 DA - 2014// TI - Reputation-based hierarchically cooperative spectrum sensing scheme in cognitive radio networks JO - China Commun VL - 11 UR - https://doi.org/10.1109/CC.2014.6821304 DO - 10.1109/CC.2014.6821304 ID - Huifang2014 ER - TY - JOUR AU - Huo, Y. AU - Tian, Y. AU - Ma, L. AU - Cheng, X. AU - Jing, T. PY - 2018 DA - 2018// TI - Jamming strategies for physical layer security JO - IEEE Wirel Commun VL - 25 UR - https://doi.org/10.1109/MWC.2017.1700015 DO - 10.1109/MWC.2017.1700015 ID - Huo2018 ER - TY - JOUR AU - Jameel, F. AU - Wyne, S. AU - Kaddoum, G. AU - Duong, T. Q. PY - 2018 DA - 2018// TI - A comprehensive survey on cooperative relaying and jamming strategies for physical layer security JO - IEEE Commun Surv Tutor VL - 21 UR - https://doi.org/10.1109/COMST.2018.2865607 DO - 10.1109/COMST.2018.2865607 ID - Jameel2018 ER - TY - JOUR AU - Jiang, F. AU - Zhu, C. AU - Peng, J. AU - Liu, W. AU - Zhu, Z. AU - He, Y. PY - 2015 DA - 2015// TI - Joint relay and jammer selection and power control for physical layer security in two-way relay networks with imperfect csi JO - Wirel Pers Commun VL - 85 UR - https://doi.org/10.1007/s11277-015-2813-4 DO - 10.1007/s11277-015-2813-4 ID - Jiang2015 ER - TY - STD TI - Jin, Z, Anand S, Subbalakshmi KP (2010) Robust spectrum decision protocol against primary user emulation attacks in dynamic spectrum access networks In: Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, 1–5. https://doi.org/10.1109/GLOCOM.2010.5683174. ID - ref28 ER - TY - STD TI - Jin, Z, Anand S, Subbalakshmi KP, Chandramouli R (2016) Connectivity of ad hoc 5g wireless networks under denial of service attacks. River Publishers. 5G Outlook-Innovations and Applications. ID - ref29 ER - TY - JOUR AU - Kapetanovic, D. AU - Zheng, G. AU - Rusek, F. PY - 2015 DA - 2015// TI - Physical layer security for massive mimo: An overview on passive eavesdropping and active attacks JO - IEEE Commun Mag VL - 53 UR - https://doi.org/10.1109/MCOM.2015.7120012 DO - 10.1109/MCOM.2015.7120012 ID - Kapetanovic2015 ER - TY - STD TI - Katagi, M, Moriai S, et al. (2008) Lightweight cryptography for the internet of things. Sony Corporation: 7–10. ID - ref31 ER - TY - JOUR AU - Khan, A. AU - Javed, Y. AU - Abdullah, J. AU - Nazim, J. AU - Khan, N. PY - 2017 DA - 2017// TI - Security issues in 5g device to device communication JO - IJCSNS VL - 17 ID - Khan2017 ER - TY - STD TI - Kuperman, G, Modiano E (2014) Disjoint path protection in multi-hop wireless networks with interference constraints In: 2014 IEEE Global Communications Conference, 4472–4477. https://doi.org/10.1109/GLOCOM.2014.7037512. ID - ref33 ER - TY - STD TI - Le, PH (2012) A performance evaluation of multi-path routing protocols for mobile ad hoc networks In: 2012 IEEE 15th International Conference on Computational Science and Engineering, 484–491. https://doi.org/10.1109/ICCSE.2012.73. ID - ref34 ER - TY - STD TI - Li, X, Cadeau W (2011) Anti-jamming performance of cognitive radio networks In: Information Sciences and Systems (CISS), 2011 45th Annual Conference On, 1–6. https://doi.org/10.1109/CISS.2011.5766199. ID - ref35 ER - TY - STD TI - Lichtman, M, Rao R, Marojevic V, Reed J, Jover RP (2018) 5g nr jamming, spoofing, and sniffing: threat assessment and mitigation In: 2018 IEEE International Conference on Communications Workshops (ICC Workshops), 1–6.. IEEE. https://doi.org/10.1109/iccw.2018.8403769. ID - ref36 ER - TY - JOUR AU - Lou, W. AU - Kwon, Y. PY - 2006 DA - 2006// TI - H-spread: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks JO - IEEE Trans Veh Technol VL - 55 UR - https://doi.org/10.1109/TVT.2006.877707 DO - 10.1109/TVT.2006.877707 ID - Lou2006 ER - TY - STD TI - Maity, S, Sinha K, Sinha BP (2017) An efficient lightweight stream cipher algorithm for wireless networks In: 2017 IEEE Wireless Communications and Networking Conference (WCNC), 1–6.. IEEE. https://doi.org/10.1109/wcnc.2017.7925562. ID - ref38 ER - TY - JOUR AU - Mavropodi, R. AU - Kotzanikolaou, P. AU - Douligeris, C. PY - 2007 DA - 2007// TI - Secmr – a secure multipath routing protocol for ad hoc networks JO - Ad Hoc Networks VL - 5 UR - https://doi.org/10.1016/j.adhoc.2006.05.020 DO - 10.1016/j.adhoc.2006.05.020 ID - Mavropodi2007 ER - TY - STD TI - McGarry, TFederal Communications Commission Technological Advisory Council, 5G Cybersecurity Subcommittee. Available at https://www.fcc.gov/general/tac-reportsand-papers. Accessed 9 Dec 2016. UR - https://www.fcc.gov/general/tac-reportsand-papers ID - ref40 ER - TY - STD TI - Mucchi, L, Ronga L, Huang K, Chen Y, Wang R (2017) A new physical-layer security measure-secrecy pressure In: GLOBECOM 2017-2017 IEEE Global Communications Conference, 1–6.. IEEE. https://doi.org/10.1109/glocom.2017.8254006. ID - ref41 ER - TY - JOUR AU - Mumtaz, S. AU - Huq, K. M. S. AU - Rodriguez, J. PY - 2014 DA - 2014// TI - Direct mobile-to-mobile communication: Paradigm for 5g JO - IEEE Wirel Commun VL - 21 UR - https://doi.org/10.1109/MWC.2014.6940429 DO - 10.1109/MWC.2014.6940429 ID - Mumtaz2014 ER - TY - STD TI - Munir, A, Qian Z, Shafiq Z, Liu A, Le F (2017) Multipath tcp traffic diversion attacks and countermeasures In: 2017 IEEE 25th International Conference on Network Protocols (ICNP), 1–10.. IEEE. https://doi.org/10.1109/icnp.2017.8117547. ID - ref43 ER - TY - STD TI - Murakami, T, Kimura T, Uemori T, Kohno E, Kakuda Y (2015) On notification message re-broadcasting for the node-disjoint multipath routing method in ad hoc networks to counter eavesdropping of data packets In: 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops, 11–16. https://doi.org/10.1109/ICDCSW.2015.14. ID - ref44 ER - TY - STD TI - Naqvi, B, Rashid I, Riaz F, Aslam B (2013) Primary user emulation attack and their mitigation strategies: A survey In: Information Assurance (NCIA), 2013 2nd National Conference On, 95–100. https://doi.org/10.1109/NCIA.2013.6725331. ID - ref45 ER - TY - STD TI - Naslund, M, Phillips S, Surridge M, Moraru M, Heikkinen S, Pernila T, Arfaoui G, Sanchez Vilchez JM, Wary J-P, O’Hanlon P, et al. (2016) 5g-ensure-d2. 3 risk assessment, mitigationReferences: Citation details for references [Naslund et al. (2016); Jin et al. (2016); Pedhadiya et al. (2018); Wang et al. (2001)] are incomplete. Please supply the “Publisher address” of these references. Otherwise, kindly advise us on how to proceed. and requirements (draft). ALBLF and 5G-ENSURE Consortium. ID - ref46 ER - TY - JOUR AU - Orsino, A. AU - Araniti, G. AU - Militano, L. AU - Alonso-Zarate, J. AU - Molinaro, A. AU - Iera, A. PY - 2016 DA - 2016// TI - Energy efficient iot data collection in smart cities exploiting d2d communications JO - Sensors VL - 16 UR - https://doi.org/10.3390/s16060836 DO - 10.3390/s16060836 ID - Orsino2016 ER - TY - STD TI - Pearlman, MR, Haas ZJ, Sholander P, Tabrizi SS (2000) On the impact of alternate path routing for load balancing in mobile ad hoc networks In: 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No. 00EX444), 3–10.. IEEE. https://doi.org/10.1109/mobhoc.2000.869207. ID - ref48 ER - TY - STD TI - Pedhadiya, MK, Jha RK, Bhatt HG (2018) Device to device communication: A survey. Elsevier. Journal of Network and Computer Applications. ID - ref49 ER - TY - STD TI - Plummer, A, Wu T, Biswas S (2007) A cognitive spectrum assignment protocol using distributed conflict graph construction In: MILCOM 2007 - IEEE Military Communications Conference, 1–7. https://doi.org/10.1109/MILCOM.2007.4455299. ID - ref50 ER - TY - JOUR AU - Porambage, P. AU - Ylianttila, M. AU - Schmitt, C. AU - Kumar, P. AU - Gurtov, A. AU - Vasilakos, A. V. PY - 2016 DA - 2016// TI - The quest for privacy in the internet of things JO - IEEE Cloud Comput VL - 3 UR - https://doi.org/10.1109/MCC.2016.28 DO - 10.1109/MCC.2016.28 ID - Porambage2016 ER - TY - JOUR AU - Radi, M. AU - Dezfouli, B. AU - Bakar, K. A. AU - Lee, M. PY - 2012 DA - 2012// TI - Multipath routing in wireless sensor networks: survey and research challenges JO - Sensors VL - 12 UR - https://doi.org/10.3390/s120100650 DO - 10.3390/s120100650 ID - Radi2012 ER - TY - JOUR AU - Safdar, G. A. AU - Ur-Rehman, M. AU - Muhammad, M. AU - Imran, M. A. AU - Tafazolli, R. PY - 2016 DA - 2016// TI - Interference mitigation in d2d communication underlaying lte-a network JO - IEEE Access VL - PP ID - Safdar2016 ER - TY - JOUR AU - Sarma, S. AU - Kuri, J. PY - 2015 DA - 2015// TI - Optimal power allocation for protective jamming in wireless networks JO - Comput Netw VL - 81 UR - https://doi.org/10.1016/j.comnet.2015.02.011 DO - 10.1016/j.comnet.2015.02.011 ID - Sarma2015 ER - TY - STD TI - Schneider, P, Horn G (2015) Towards 5G Security In: 2015 IEEE Trustcom/BigDataSE/ISPA, 1165–1170.. Helsinki. https://doi.org/10.1109/Trustcom.2015.499. ID - ref55 ER - TY - STD TI - Sedidi, R, Kumar A (2016) Key exchange protocols for secure device-to-device (d2d) communication in 5g In: 2016 Wireless Days (WD), 1–6. https://doi.org/10.1109/WD.2016.7461477. ID - ref56 ER - TY - STD TI - Shafiq, MZ, Le F, Srivatsa M, Liu AX (2013) Cross-path inference attacks on multipath tcp In: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks–HotNets-XII, 15.. ACM. https://doi.org/10.1145/2535771.2535782. ID - ref57 ER - TY - STD TI - Skouby, KE, Lynggaard P (2014) Smart home and smart city solutions enabled by 5g, iot, aai and cot services In: 2014 International Conference on Contemporary Computing and Informatics (IC3I), 874–878.. IEEE. https://doi.org/10.1109/ic3i.2014.7019822. ID - ref58 ER - TY - STD TI - Soto, J, Queiroz S, Gregori M, Nogueira M (2013) A flexible multi-criteria scheme to detect primary user emulation attacks in crahns In: World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2013 IEEE 14th International Symposium and Workshops on A, 1–6. https://doi.org/10.1109/WoWMoM.2013.6583453. ID - ref59 ER - TY - STD TI - Strasser, M, Pöpper C, Capkun S, Cagalj M (2008) Jamming-resistant key establishment using uncoordinated frequency hopping In: 2008 IEEE Symposium on Security and Privacy (sp 2008), 64–78. https://doi.org/10.1109/SP.2008.9. ID - ref60 ER - TY - STD TI - Su, H, Wang Q, Ren K, Xing K (2011) Jamming-resilient dynamic spectrum access for cognitive radio networks In: 2011 IEEE International Conference on Communications (ICC), 1–5.. IEEE. https://doi.org/10.1109/icc.2011.5962525. ID - ref61 ER - TY - JOUR AU - Sun, L. AU - Du, Q. PY - 2017 DA - 2017// TI - Physical layer security with its applications in 5g networks: A review JO - China Commun VL - 14 UR - https://doi.org/10.1109/CC.2017.8246328 DO - 10.1109/CC.2017.8246328 ID - Sun2017 ER - TY - STD TI - Teotia, V, Kumar V, Minz S (2015) Conflict graph based channel allocation in cognitive radio networks In: 2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW), 52–56. https://doi.org/10.1109/SRDSW.2015.19. ID - ref63 ER - TY - JOUR AU - Thulasiraman, P. AU - Chen, J. AU - Shen, X. PY - 2011 DA - 2011// TI - Multipath routing and max-min fair qos provisioning under interference constraints in wireless multihop networks JO - IEEE Transactions on Parallel and Distributed Systems VL - 22 UR - https://doi.org/10.1109/TPDS.2010.145 DO - 10.1109/TPDS.2010.145 ID - Thulasiraman2011 ER - TY - STD TI - Tran, D. A., Raghavendra H. (2005) Routing with congestion awareness and adaptivity in mobile ad hoc networks In: IEEE Wireless Communications and Networking Conference, 2005, 1988–1994.. IEEE. https://doi.org/10.1109/wcnc.2005.1424824. ID - ref65 ER - TY - STD TI - Tushir, B, Dhurandher SK, Woungang I, Obaidat MS, Teotia V (2016) Graph colouring technique for efficient channel allocation in cognitive radio networks In: 2016 IEEE International Conference on Communications (ICC), 1–5. https://doi.org/10.1109/ICC.2016.7510607. ID - ref66 ER - TY - JOUR AU - Velásquez-Villada, C. AU - Donoso, Y. PY - 2013 DA - 2013// TI - Multipath routing network management protocol for resilient and energy efficient wireless sensor networks JO - Procedia Comput Sci VL - 17 UR - https://doi.org/10.1016/j.procs.2013.05.050 DO - 10.1016/j.procs.2013.05.050 ID - Velásquez-Villada2013 ER - TY - STD TI - Wang, L, Shu Y, Dong M, Zhang L, Yang OW (2001) Adaptive multipath source routing in ad hoc networks In: ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No. 01CH37240), 867–871.. IEEE. ID - ref68 ER - TY - STD TI - Wang, M, Yan Z (2015) Security in d2d communications: A review In: Trustcom/BigDataSE/ISPA, 2015 IEEE, 1199–1204. https://doi.org/10.1109/Trustcom.2015.505. ID - ref69 ER - TY - JOUR AU - Wu, Y. AU - Wang, B. AU - Liu, K. J. R. AU - Clancy, T. C. PY - 2012 DA - 2012// TI - Anti-jamming games in multi-channel cognitive radio networks JO - IEEE Journal on Selected Areas in Communications VL - 30 UR - https://doi.org/10.1109/JSAC.2012.120102 DO - 10.1109/JSAC.2012.120102 ID - Wu2012 ER - TY - STD TI - Wu, W, Zhang Y (2014) Constructing conflict graph for d2d communications in cellular systems In: 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP), 1–6. https://doi.org/10.1109/WCSP.2014.6992092. ID - ref71 ER - TY - STD TI - Yang, Y, Wang J, Kravets R (2005) Designing routing metrics for mesh networks In: IEEE Workshop on Wireless Mesh Networks (WiMesh), 1–9, Santa Clara. ID - ref72 ER - TY - STD TI - Yang, S, Tang W (2014) On the maximum throughput of multiple-path transmission via irreducible and neighbor-disjoint paths in multiple-hop wireless networks In: 2014 European Modelling Symposium, 397–402. https://doi.org/10.1109/EMS.2014.42. ID - ref73 ER - TY - STD TI - Yang, F, Wang Q, Amer PD (2014) Out-of-order transmission for in-order arrival scheduling for multipath tcp In: 2014 28th International Conference on Advanced Information Networking and Applications Workshops, 749–752.. IEEE. https://doi.org/10.1109/waina.2014.122. ID - ref74 ER - TY - JOUR AU - Yang, N. AU - Wang, L. AU - Geraci, G. AU - Elkashlan, M. AU - Yuan, J. AU - Di Renzo, M. PY - 2015 DA - 2015// TI - Safeguarding 5g wireless communication networks using physical layer security JO - IEEE Commun Mag VL - 53 UR - https://doi.org/10.1109/MCOM.2015.7081071 DO - 10.1109/MCOM.2015.7081071 ID - Yang2015 ER - TY - STD TI - Yu, Y, Liang M (2015) A node-disjoint multipath routing protocol in manets In: 2015 International Conference on Computer Science and Mechanical Automation (CSMA), 108–112. https://doi.org/10.1109/CSMA.2015.28. ID - ref76 ER - TY - CHAP AU - Yu, T. AU - Jin, H. AU - Nahrstedt, K. PY - 2016 DA - 2016// TI - Writinghacker: Audio based eavesdropping of handwriting via mobile devices BT - Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp ’16 PB - ACM CY - New York UR - https://doi.org/10.1145/2971648.2971681 DO - 10.1145/2971648.2971681 ID - Yu2016 ER - TY - JOUR AU - Xie, N. AU - Zhang, S. PY - 2018 DA - 2018// TI - Blind authentication at the physical layer under time-varying fading channels JO - IEEE J Sel Areas Commun VL - 36 UR - https://doi.org/10.1109/JSAC.2018.2824583 DO - 10.1109/JSAC.2018.2824583 ID - Xie2018 ER - TY - STD TI - Xu, Y, Liu Y, Yang K, Li D, Labs QLB (2013) Interference mitigation scheme for device-to-device communication with qos constraint In: 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 1784–1788. https://doi.org/10.1109/PIMRC.2013.6666432. ID - ref79 ER - TY - JOUR AU - Xu, J. AU - Duan, L. AU - Zhang, R. PY - 2017 DA - 2017// TI - Proactive eavesdropping via cognitive jamming in fading channels JO - IEEE Trans Wirel Commun VL - 16 UR - https://doi.org/10.1109/TWC.2017.2666138 DO - 10.1109/TWC.2017.2666138 ID - Xu2017 ER - TY - JOUR AU - Xu, J. AU - Duan, L. AU - Zhang, R. PY - 2017 DA - 2017// TI - Surveillance and intervention of infrastructure-free mobile communications: A new wireless security paradigm JO - IEEE Wirel Commun VL - 24 UR - https://doi.org/10.1109/MWC.2017.1600279 DO - 10.1109/MWC.2017.1600279 ID - Xu2017 ER - TY - STD TI - Zhang, R, Song L, Han Z, Jiao B, Debbah M (2010) Physical layer security for two way relay communications with friendly jammers In: Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, 1–6. https://doi.org/10.1109/GLOCOM.2010.5683465. ID - ref82 ER - TY - JOUR AU - Zou, Y. AU - Zhu, J. AU - Wang, X. AU - Hanzo, L. PY - 2016 DA - 2016// TI - A survey on wireless security: Technical challenges, recent advances, and future trends JO - Proceedings of the IEEE VL - 104 UR - https://doi.org/10.1109/JPROC.2016.2558521 DO - 10.1109/JPROC.2016.2558521 ID - Zou2016 ER -