Results 31 to 40 of about 60,380 (140)

IDLP: An Efficient Intrusion Detection and Location-Aware Prevention Mechanism for Network Coding-Enabled Mobile Small Cells

open access: yesIEEE Access, 2020
Mobile small cell technology is considered as a 5G enabling technology for delivering ubiquitous 5G services in a cost-effective and energy efficient manner.
Reza Parsamehr   +3 more
doaj   +1 more source

Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy [PDF]

open access: yesarXiv, 2023
IoT Servers that receive and process packets from IoT devices should meet the QoS needs of incoming packets, and support Attack Detection software that analyzes the incoming traffic to identify and discard packets that may be part of a Cyberattack. Since UDP Flood Attacks can overwhelm IoT Servers by creating congestion that paralyzes their operation ...
arxiv  

An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks [PDF]

open access: yesJCP, 13(6), 705-720 (2018), 2020
MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for ...
arxiv   +1 more source

EAODV: A*-BASED ENHANCEMENT AD-HOC ON DEMAND VECTOR PROTOCOL TO PREVENT BLACK HOLE ATTACKS

open access: yesJurnal Ilmu Komputer dan Informasi, 2013
Black hole attack is an attack where a node that responds to RREQ from the source node by replying a fake freshness information and false hop count. The black hole nodes do not respond to distributed co-operation in routing protocol to absorb all the ...
Khalil I Ghathwan   +2 more
doaj   +1 more source

Distributed fusion filter over lossy wireless sensor networks with the presence of non-Gaussian noise [PDF]

open access: yesarXiv, 2023
The information transmission between nodes in a wireless sensor networks (WSNs) often causes packet loss due to denial-of-service (DoS) attack, energy limitations, and environmental factors, and the information that is successfully transmitted can also be contaminated by non-Gaussian noise.
arxiv  

A new method for improving security in MANETs AODV Protocol [PDF]

open access: yesManagement Science Letters, 2012
In mobile ad hoc network (MANET), secure communication is more challenging task due to its fundamental characteristics like having less infrastructure, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained ...
Zahra Alishahi   +2 more
doaj  

Provenance-enabled Packet Path Tracing in the RPL-based Internet of Things [PDF]

open access: yesComputer Networks Volume 173, 22 May 2020, 107189, 2018
The interconnection of resource-constrained and globally accessible things with untrusted and unreliable Internet make them vulnerable to attacks including data forging, false data injection, and packet drop that affects applications with critical decision-making processes.
arxiv   +1 more source

Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Designing wireless sensor networks (WSNs) that can work reliably in the presence of inside packet drop attackers is very challenging. Current trust mechanisms and avoidance approaches are promising but have their limitations.
Youngho Cho, Gang Qu
doaj   +1 more source

Secure IoT Routing: Selective Forwarding Attacks and Trust-based Defenses in RPL Network [PDF]

open access: yesarXiv, 2022
IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is an essential routing protocol to enable communications for IoT networks with low power devices. RPL uses an objective function and routing constraints to find an optimized routing path for each node in the network.
arxiv  

Moving target defense against network eavesdropping attack using POF

open access: yesTongxin xuebao, 2018
Eavesdropping attack hereby was the major attack for traditional network communication.As this kind of attacks was stealthy and untraceable,it was barely detectable for those feature detection or static configuration based passive defense approaches ...
Duohe MA, Qiong LI, Dongdai LIN
doaj   +2 more sources

Home - About - Disclaimer - Privacy