Results 1 to 10 of about 1,392 (240)

A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks [PDF]

open access: goldSensors, 2023
Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose.
Youngho Cho, Gang Qu
doaj   +2 more sources

A flying ad-hoc network dataset for early time series classification of grey hole attacks [PDF]

open access: yesScientific Data
Flying ad-hoc networks (FANETs) consist of multiple unmanned aerial vehicles (UAVs) that rely on multi-hop routes for communication. These routes are particularly susceptible to grey hole attacks, necessitating swift and accurate defence to preserve the ...
Charles Hutchins   +3 more
doaj   +2 more sources

RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things [PDF]

open access: yesPeerJ Computer Science, 2023
Routing protocols transmit vast amounts of sensor data between the Wireless Sensor Network (WSN) and the Internet of Things (IoT) gateway. One of these routing protocols is Routing Protocol for Low Power and Lossy Networks (RPL). The Internet Engineering
Zainab Alansari   +3 more
doaj   +2 more sources

Interest flooding attack mitigation in a vehicular named data network

open access: yesIET Intelligent Transport Systems, 2021
Vehicular named data network (VNDN) is the next‐generation network architecture for intelligent transportation system. Contrary to the conventional transmission control protocol/internet protocol (TCP/IP) communication model, VNDN follows a data‐centric ...
Muhammad Abdullah   +3 more
doaj   +1 more source

FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks

open access: yesIEEE Access, 2023
Delay/Disruption Tolerant Networks (DTNs) are a special category of IntermittentlyConnectedNetworks (ICNs). It has features such as long-delay, frequent-disruption, asymmetrical-data-rates, and high-bundle-error-rates. DTNs have been mainly developed for
Waqar Khalid   +5 more
doaj   +1 more source

Security Provision by Using Detection and Prevention Methods to Ensure Trust in Edge-Based Smart City Networks

open access: yesIEEE Access, 2023
The concept of smart cities is unique where the intelligent information technologies have used to form a heterogeneous with the help of edge and fog networks.
Abeer Iftikhar   +3 more
doaj   +1 more source

An Improved Machine Learning Model with Hybrid Technique in VANET for Robust Communication

open access: yesMathematics, 2022
The vehicular ad hoc network, VANET, is one of the most popular and promising technologies in intelligent transportation today. However, VANET is susceptible to several vulnerabilities that result in an intrusion.
Gagan Preet Kour Marwah   +8 more
doaj   +1 more source

FMDADM: A Multi-Layer DDoS Attack Detection and Mitigation Framework Using Machine Learning for Stateful SDN-Based IoT Networks

open access: yesIEEE Access, 2023
The absence of standards and the diverse nature of the Internet of Things (IoT) have made security and privacy concerns more acute. Attacks such as distributed denial of service (DDoS) are becoming increasingly widespread in IoT, and the need for ways to
Walid I. Khedr   +2 more
doaj   +1 more source

Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks

open access: yesIEEE Access, 2019
Performance and security are two critical functions of wireless ad-hoc networks (WANETs). Network security ensures the integrity, availability, and performance of WANETs.
T. Poongodi   +4 more
doaj   +1 more source

Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles

open access: yesIEEE Access, 2020
Detection of Black Hole attacks is one of the most challenging and critical routing security issues in vehicular ad hoc networks (VANETs) and autonomous and connected vehicles (ACVs).
Zohaib Hassan   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy