Results 1 to 10 of about 1,290,040 (147)

WLAN Integrated with GPRS Network Securely [PDF]

open access: yesAl-Khawarizmi Engineering Journal, 2012
In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server.
Mohammed A. Abdalla   +2 more
doaj   +3 more sources

HTTP Parameter Sorting Covert Channel Detection Method Based on Markov Model [PDF]

open access: yesJisuanji gongcheng, 2020
The network covert channel is a communication channel that establishes secret message transmission between different hosts on the network by utilizing reserved,optional or undefined fields in the network protocols.HTTP protocol,as one of the most ...
SHEN Guoliang, ZHAI Jiangtao, DAI Yuewei
doaj   +1 more source

Secure neural network watermarking protocol against forging attack

open access: yesEURASIP Journal on Image and Video Processing, 2020
In order to protect the intellectual property of neural network, an owner may select a set of trigger samples and their corresponding labels to train a network, and prove the ownership by the trigger set without revealing the inner mechanism and ...
Renjie Zhu   +3 more
doaj   +1 more source

A Social DTN Network Routing Algorithm Based on Data Link

open access: yesJournal of Harbin University of Science and Technology, 2020
Data transmission in the network rely on network protocols, while the design of network protocols also require accommodation with the communication environmental characteristics. The design of TCP/IP protocol is based on wired network or wireless network
WANG Zhihai, GAO Xueyao
doaj   +1 more source

Oriented Multicast Routing Applied to Network Level Agent Search [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2001
Many protocols need a discovery mechanism to enable a given node to locate one or several nodes involved in the same communication. However, there is no protocol ready to fulfill this service at the network-layer.
Damien Magoni, Jean-Jacques Pansiot
doaj   +1 more source

New Enhanced Authentication Protocol for Internet of Things

open access: yesBig Data Mining and Analytics, 2021
Internet of Things (IoT) refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely.
Mourade Azrour   +3 more
doaj   +1 more source

An Optimized Probabilistic Delay Tolerant Network (DTN) Routing Protocol Based on Scheduling Mechanism for Internet of Things (IoT)

open access: yesSensors, 2019
Many applications of Internet of Things (IoT) have been implemented based on unreliable wireless or mobile networks like the delay tolerant network (DTN).
Yuxin Mao   +3 more
doaj   +1 more source

A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack

open access: yesJournal of Electrical Systems and Information Technology, 2018
Nowadays, ZigBee communication protocol is one of the dominating standards for wireless sensor & ad-hoc networks and Internet of Things (IoT) networks. Even though the ZigBee standard was formed with security in mind and lower consumption of power, still
Jegan Govindasamy   +1 more
doaj   +1 more source

RLBEEP: Reinforcement-Learning-Based Energy Efficient Control and Routing Protocol for Wireless Sensor Networks

open access: yesIEEE Access, 2022
One of the most important topics in the field of wireless sensor networks is the development of approaches to improve network lifetime. In this paper, an energy-efficient control and routing protocol for wireless sensor networks is presented.
Ali Forghani Elah Abadi   +5 more
doaj   +1 more source

Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks [PDF]

open access: yes, 2016
Chaminda Alocious, Hannan Xiao, B. Christianson, 'Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks' paper presented at the 2016 IEEE Wireless Communications and Networking Conference (IEEE WCNC). Doha, Qatar.
Alocious, Chaminda   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy