Results 21 to 30 of about 41,910 (290)
PROVENANCE FORGERY AND PACKET DROP ATTACKS DETECTION IN WIRELESS NETWORKS ,
openaire +2 more sources
Provenance Based Mechanism to identify Packet Drop attack in WSN
Anudeepa ., Amutha S
openaire +2 more sources
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things [PDF]
Routing protocols transmit vast amounts of sensor data between the Wireless Sensor Network (WSN) and the Internet of Things (IoT) gateway. One of these routing protocols is Routing Protocol for Low Power and Lossy Networks (RPL). The Internet Engineering
Zainab Alansari +3 more
doaj +2 more sources
Selective Packet Dropping Attacks to BESS-integrated Smart Grids [PDF]
Yongdong Wu +5 more
openaire +2 more sources
Interest flooding attack mitigation in a vehicular named data network
Vehicular named data network (VNDN) is the next‐generation network architecture for intelligent transportation system. Contrary to the conventional transmission control protocol/internet protocol (TCP/IP) communication model, VNDN follows a data‐centric ...
Muhammad Abdullah +3 more
doaj +1 more source
Delay/Disruption Tolerant Networks (DTNs) are a special category of IntermittentlyConnectedNetworks (ICNs). It has features such as long-delay, frequent-disruption, asymmetrical-data-rates, and high-bundle-error-rates. DTNs have been mainly developed for
Waqar Khalid +5 more
doaj +1 more source
The concept of smart cities is unique where the intelligent information technologies have used to form a heterogeneous with the help of edge and fog networks.
Abeer Iftikhar +3 more
doaj +1 more source
An Improved Machine Learning Model with Hybrid Technique in VANET for Robust Communication
The vehicular ad hoc network, VANET, is one of the most popular and promising technologies in intelligent transportation today. However, VANET is susceptible to several vulnerabilities that result in an intrusion.
Gagan Preet Kour Marwah +8 more
doaj +1 more source
The absence of standards and the diverse nature of the Internet of Things (IoT) have made security and privacy concerns more acute. Attacks such as distributed denial of service (DDoS) are becoming increasingly widespread in IoT, and the need for ways to
Walid I. Khedr +2 more
doaj +1 more source
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
Performance and security are two critical functions of wireless ad-hoc networks (WANETs). Network security ensures the integrity, availability, and performance of WANETs.
T. Poongodi +4 more
doaj +1 more source

