Results 31 to 40 of about 83,142 (315)

FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks

open access: yesIEEE Access, 2023
Delay/Disruption Tolerant Networks (DTNs) are a special category of IntermittentlyConnectedNetworks (ICNs). It has features such as long-delay, frequent-disruption, asymmetrical-data-rates, and high-bundle-error-rates. DTNs have been mainly developed for
Waqar Khalid   +5 more
doaj   +1 more source

Security Provision by Using Detection and Prevention Methods to Ensure Trust in Edge-Based Smart City Networks

open access: yesIEEE Access, 2023
The concept of smart cities is unique where the intelligent information technologies have used to form a heterogeneous with the help of edge and fog networks.
Abeer Iftikhar   +3 more
doaj   +1 more source

An Improved Machine Learning Model with Hybrid Technique in VANET for Robust Communication

open access: yesMathematics, 2022
The vehicular ad hoc network, VANET, is one of the most popular and promising technologies in intelligent transportation today. However, VANET is susceptible to several vulnerabilities that result in an intrusion.
Gagan Preet Kour Marwah   +8 more
doaj   +1 more source

Towards Mitigating Jellyfish Attacks Based on Honesty Metrics in V2X Autonomous Networks

open access: yesApplied Sciences, 2023
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due to the distinct characteristics of such networks, such as their highly dynamic topology and frequent connectivity disruptions. Jellyfish attacks are a sort of
Messaoud Benguenane   +3 more
doaj   +1 more source

Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles

open access: yesIEEE Access, 2020
Detection of Black Hole attacks is one of the most challenging and critical routing security issues in vehicular ad hoc networks (VANETs) and autonomous and connected vehicles (ACVs).
Zohaib Hassan   +4 more
doaj   +1 more source

FRID: Flood Attack Mitigation Using Resources Efficient Intrusion Detection Techniques in Delay Tolerant Networks

open access: yesIEEE Access, 2019
Delay tolerant networks (DTNs) are a special type of intermittently connected networks (ICN) featured by variable delay, frequent disruption, asymmetric data rates, and high-error rates. The DTNs have been primarily developed for interplanetary networks (
Waqar Khalid   +5 more
doaj   +1 more source

A Practical Website Fingerprinting Attack via CNN-Based Transfer Learning

open access: yesMathematics, 2023
Website fingerprinting attacks attempt to apply deep learning technology to identify websites corresponding to encrypted traffic data. Unfortunately, to the best of our knowledge, once the total number of encrypted traffic data becomes insufficient, the ...
Tianyao Pan, Zejia Tang, Dawei Xu
doaj   +1 more source

Dissecting Denial of Service (DoS) Syn Flood Attack Dynamics and Impacts in Vehicular Communication Systems [PDF]

open access: yesITM Web of Conferences
In the rapidly evolving landscape of vehicular networks, the resilience of vehicular communication systems against Denial of Service (DoS) attacks is critical.
Zamrai Muhammad Arif Hakimi   +2 more
doaj   +1 more source

Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES [PDF]

open access: yesJournal of Universal Computer Science, 2019
In wireless communication, Mobile Ad Hoc Network (MANET) consists of a number of mobile nodes which are communicated with each other without any base station.
K. Shankar, Mohamed Elhoseny
doaj   +3 more sources

Monitoring Agent for Detecting Malicious Packet Drops for Wireless Sensor Networks in the Microgrid and Grid-Enabled Vehicles

open access: yesInternational Journal of Advanced Robotic Systems, 2012
Of the range of wireless communication technologies, wireless sensor networks (WSN) will be one of the most appropriate technologies for the Microgrid and Grid-enabled Vehicles in the Smartgrid.
Jongbin Ko   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy