Results 31 to 40 of about 37,323 (253)

Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks

open access: yesApplied Sciences, 2022
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control Message Protocol version six (ICMPv6), an essential protocol to the IPv6 ...
Omar E. Elejla   +5 more
semanticscholar   +1 more source

Surfing the Internet-of-Things: Lightweight Access and Control ofWireless Sensor Networks Using Industrial Low Power Protocols [PDF]

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2014
Internet-of-Things (IoT) is emerging to play an important role in the continued advancement of information and communication technologies. To accelerate industrial application developments, the use of web services for networking applications is seen as ...
Zhengguo Sheng   +2 more
doaj   +1 more source

Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey

open access: yesIEEE Access, 2021
Vehicular Ad hoc Networks (VANET) broadcast messages regarding road and environmental conditions. Due to its design, VANET inadvertently introduced security and privacy issues.
Mahmood A. Al-Shareeda   +4 more
doaj   +1 more source

Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller–A Review

open access: yesIEEE Access, 2020
The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from ...
Mohammad A. Aladaileh   +4 more
doaj   +1 more source

Authentication and Privacy Approach for DHCPv6

open access: yesIEEE Access, 2019
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is used to allocate and distribute IPv6 addresses and network configuration parameters to DHCPv6 clients.
Ayman Al-Ani   +4 more
doaj   +1 more source

Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

open access: yesIEEE Access, 2021
Vehicular ad hoc networks (VANETs) have become increasingly common in the past decades and provides essential and efficient communication for vehicles within intelligent transportation systems. Securing the VANETs wireless communication channel is one of
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks

open access: yesApplied Sciences, 2022
The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G communication rely heavily on the vehicle’s tamper-proof device (TPD) and roadside units (RSUs ...
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

Deep Learning-based Algorithm for Active IPv6 Address Prediction [PDF]

open access: yesJisuanji kexue, 2023
The huge address space of IPv6 makes it difficult to achieve a global IPv6 address scan based on the existing network speed and hardware computing power.Fast IPv6 address scanning can be achieved by using address generation algorithms to predict the ...
LI Yuqiang, LI Linfeng, ZHU Hao, HOU Mengshu
doaj   +1 more source

SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks

open access: yesSensors, 2021
Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system. Therefore, the security and privacy issues in VANETs are entitled to be the most important.
Mahmood A. Al-Shareeda   +3 more
doaj   +1 more source

Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review

open access: yesIEEE Access, 2022
For many reasons, Ethereum attracts more investors, researchers, and even scammers; this is the first platform that enables the new Decentralized Applications (DApps) to run on top of the blockchain network.
Arkan Hammoodi Hasan Kabla   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy