Results 21 to 30 of about 41,910 (290)

PROVENANCE FORGERY AND PACKET DROP ATTACKS DETECTION IN WIRELESS NETWORKS ,

open access: diamondInternational Journal of Advance Engineering and Research Development, 2016
openaire   +2 more sources

Provenance Based Mechanism to identify Packet Drop attack in WSN

open access: hybridInternational Journal of Computer Sciences and Engineering, 2018
Anudeepa ., Amutha S
openaire   +2 more sources

RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things [PDF]

open access: yesPeerJ Computer Science, 2023
Routing protocols transmit vast amounts of sensor data between the Wireless Sensor Network (WSN) and the Internet of Things (IoT) gateway. One of these routing protocols is Routing Protocol for Low Power and Lossy Networks (RPL). The Internet Engineering
Zainab Alansari   +3 more
doaj   +2 more sources

Selective Packet Dropping Attacks to BESS-integrated Smart Grids [PDF]

open access: gold, 2023
Yongdong Wu   +5 more
openaire   +2 more sources

Interest flooding attack mitigation in a vehicular named data network

open access: yesIET Intelligent Transport Systems, 2021
Vehicular named data network (VNDN) is the next‐generation network architecture for intelligent transportation system. Contrary to the conventional transmission control protocol/internet protocol (TCP/IP) communication model, VNDN follows a data‐centric ...
Muhammad Abdullah   +3 more
doaj   +1 more source

FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks

open access: yesIEEE Access, 2023
Delay/Disruption Tolerant Networks (DTNs) are a special category of IntermittentlyConnectedNetworks (ICNs). It has features such as long-delay, frequent-disruption, asymmetrical-data-rates, and high-bundle-error-rates. DTNs have been mainly developed for
Waqar Khalid   +5 more
doaj   +1 more source

Security Provision by Using Detection and Prevention Methods to Ensure Trust in Edge-Based Smart City Networks

open access: yesIEEE Access, 2023
The concept of smart cities is unique where the intelligent information technologies have used to form a heterogeneous with the help of edge and fog networks.
Abeer Iftikhar   +3 more
doaj   +1 more source

An Improved Machine Learning Model with Hybrid Technique in VANET for Robust Communication

open access: yesMathematics, 2022
The vehicular ad hoc network, VANET, is one of the most popular and promising technologies in intelligent transportation today. However, VANET is susceptible to several vulnerabilities that result in an intrusion.
Gagan Preet Kour Marwah   +8 more
doaj   +1 more source

FMDADM: A Multi-Layer DDoS Attack Detection and Mitigation Framework Using Machine Learning for Stateful SDN-Based IoT Networks

open access: yesIEEE Access, 2023
The absence of standards and the diverse nature of the Internet of Things (IoT) have made security and privacy concerns more acute. Attacks such as distributed denial of service (DDoS) are becoming increasingly widespread in IoT, and the need for ways to
Walid I. Khedr   +2 more
doaj   +1 more source

Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks

open access: yesIEEE Access, 2019
Performance and security are two critical functions of wireless ad-hoc networks (WANETs). Network security ensures the integrity, availability, and performance of WANETs.
T. Poongodi   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy