Results 11 to 20 of about 60,380 (140)
A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks [PDF]
Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose.
Youngho Cho, Gang Qu
doaj +4 more sources
Connect attack in IoT-WSN detect through cyclic analysis based on forward and backward elimination [PDF]
IoT-wireless sensor networks (WSN) have extensive applications in diverse fields such as battlegrounds, commercial sectors, habitat monitoring, buildings, smart homes, and traffic surveillance.
Tamil Selvi S., Visalakshi P.
doaj +3 more sources
A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks [PDF]
In multi-hop mobile ad hoc networks (MANETs),mobile nodes cooperate with each other without using any infrastructure such as access points or base stations. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring ...
Jaydip Sen+4 more
openalex +3 more sources
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things [PDF]
Routing protocols transmit vast amounts of sensor data between the Wireless Sensor Network (WSN) and the Internet of Things (IoT) gateway. One of these routing protocols is Routing Protocol for Low Power and Lossy Networks (RPL). The Internet Engineering
Zainab Alansari+3 more
doaj +2 more sources
Runtime Mitigation of Packet Drop Attacks in Fault-tolerant Networks-on-Chip [PDF]
Fault-tolerant routing (FTR) in Networks-on-Chip (NoCs) has become a common practice to sustain the performance of multi-core systems with an increasing number of faults on a chip. On the other hand, usage of third-party intellectual property blocks has made security a primary concern in modern day designs. This article presents a mechanism to mitigate
Neeli R. Prasad+3 more
openalex +3 more sources
Interest flooding attack mitigation in a vehicular named data network
Vehicular named data network (VNDN) is the next‐generation network architecture for intelligent transportation system. Contrary to the conventional transmission control protocol/internet protocol (TCP/IP) communication model, VNDN follows a data‐centric ...
Muhammad Abdullah+3 more
doaj +1 more source
Delay/Disruption Tolerant Networks (DTNs) are a special category of IntermittentlyConnectedNetworks (ICNs). It has features such as long-delay, frequent-disruption, asymmetrical-data-rates, and high-bundle-error-rates. DTNs have been mainly developed for
Waqar Khalid+5 more
doaj +1 more source
The concept of smart cities is unique where the intelligent information technologies have used to form a heterogeneous with the help of edge and fog networks.
Abeer Iftikhar+3 more
doaj +1 more source
An Improved Machine Learning Model with Hybrid Technique in VANET for Robust Communication
The vehicular ad hoc network, VANET, is one of the most popular and promising technologies in intelligent transportation today. However, VANET is susceptible to several vulnerabilities that result in an intrusion.
Gagan Preet Kour Marwah+8 more
doaj +1 more source
The absence of standards and the diverse nature of the Internet of Things (IoT) have made security and privacy concerns more acute. Attacks such as distributed denial of service (DDoS) are becoming increasingly widespread in IoT, and the need for ways to
Walid I. Khedr+2 more
doaj +1 more source