Results 51 to 60 of about 4,734 (200)
Wormhole attack detection techniques in ad-hoc network: A systematic review
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different
Gupta Chitvan +2 more
doaj +1 more source
We investigate the formation via tunneling of inflating (false-vacuum) bubbles in a true-vacuum background, and the reverse process. Using effective potentials from the junction condition formalism, all true- and false-vacuum bubble solutions with ...
A. D. Linde +2 more
core +1 more source
Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi +2 more
wiley +1 more source
Impact of Blackhole and Wormhole Attacks on DSDV Routing Protocol in VANET: Behavioural Analysis
Vehicular Ad-Hoc Networks (VANETs) play a crucial role in Intelligent Transportation Systems (ITS) and the advancement of intelligent vehicles, enabling seamless and reliable communication between vehicles and infrastructure. This communication supports
Ahmad Yusri Dak +2 more
doaj +1 more source
A review on wormhole attacks in MANET [PDF]
Mobile Ad-hoc Network (MANET) refers to a multi-hop packet based wireless network consist of number of mobile nodes which be able to communicate and move simultaneously, without using any fixed infrastructure.
Enshaei, Mehdi, Mohd Hanapi, Zurina
core
The hydrolysis rate matching strategy, crystallization rate matching strategy of the titanium and silicon sources, dissolution‐recrystallization strategy in the synthesis process can be designed to regulate the microenvironment of active centers to design TS‐1 enriched in Ti active species.
Yan Xue +9 more
wiley +1 more source
Secure Neighbor Discovery in Wireless Sensor Networks Using Range-Free Localization Techniques
If a wireless sensor network (WSN) is deployed in a hostile environment, the intrinsic limitations of the nodes lead to many security issues. In this paper, we address a particular attack to the location and neighbor discovery protocols, carried out by ...
Mariano García-Otero +1 more
doaj +1 more source
Isolating Wormhole Attack in Wireless Sensor Networks
Short Retraction Notice Circuits and Systems (CS) does not meet author’s publication requirements. This article has been retracted to straighten the academic record. In making this decision the Editorial Board follows COPE's Retraction Guidelines.
L. Thanga Mariappan, K. Rubasoundar
openaire +2 more sources
Effects of Evolving Precipitation on Chemical Transport Through Porous Media
Abstract Flow through porous media together with precipitation and/or dissolution reactions involves a unique feedback behavior as these medium‐altering reactions affect the flow field and vice versa. Herein, the relationship between a gradually increasing degree of precipitation and the degree of anomalous transport (i.e., divergence from Fickian ...
Matan Cohen, Ishai Dror, Brian Berkowitz
wiley +1 more source
Network Control Systems (NCS), including Wireless Sensor Networks (WSN) are broadly deployed across different application areas. A prominent dispute in WSNs is the liability to wormhole attacks, which lead to routing errors, degradation of sensor network
Avina A, Geetha M. R
doaj +1 more source

