An Intrusion Prevention System embedded AODV to protect Mobile Adhoc Network against Sybil Attack
Mobile Ad hoc Network (MANET) is a group of self-directed, self-organizing and freely
moving mobile nodes connected through wireless links, without the support of any central …
moving mobile nodes connected through wireless links, without the support of any central …
Trustworthiness assessment for industrial IoT as multilayer networks with von Neumann entropy
Abstract The Industrial Internet of Things (IIoT) has expanded worldwide rapidly, which
brings key devices and applications of IIoT under a trustworthy umbrella that reinforces …
brings key devices and applications of IIoT under a trustworthy umbrella that reinforces …
Trust Embedded AODV for securing and Analyzing Blackhole attack in MANET
E Lema, G Esubalew, M Desalegn… - … in Engineering (WIE …, 2022 - ieeexplore.ieee.org
Recently, the rising use of portable devices with advanced wireless communication gives
Mobile ad-hoc networks more significance with the expanding number of widespread …
Mobile ad-hoc networks more significance with the expanding number of widespread …
Comparative Analysis of Encryption and Decryption for Securing Environmental Sector Telemetry Data
A Abdullah, N Hafeez, A Ur Rehman… - … of Computing and …, 2024 - journals.uob.edu.bh
This work investigates the encryption and decoding strategies for getting ecological sensor
telemetry information. The review assesses both symmetric and awry encryption calculations …
telemetry information. The review assesses both symmetric and awry encryption calculations …
RETRACTED ARTICLE: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM
M Venkata Rao, D Midhunchakkaravarthy… - Journal of Computer …, 2023 - Springer
A worm is a self-reproducing malware that spreads from one computer to other computers
through the internet. A single Internet worm has the potential to infect millions of computers …
through the internet. A single Internet worm has the potential to infect millions of computers …
Load balancing Technique toward Congestion minimization in WSN-enabled-Healthcare
Nowadays, WSN is effectively using in healthcare application by means of body area
network, which is senor-based wearable devices mainly utilized in health care prevention …
network, which is senor-based wearable devices mainly utilized in health care prevention …
Machine Learning Technique of Intrusion Detection System for Vehicular Ad Hoc Networks: An Analysis
SK Khadagade, A Rai, K Rai - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
A vehicular ad-hoc network (VANET) is a subset of mobile AD-NET that enables
communication between automobiles and surrounding fixed equipment, which is often …
communication between automobiles and surrounding fixed equipment, which is often …
TBSMFA: Trust-Based Security Mechanism for SYN Flooding Attack at Transport Layer using DRICC technique in WSN
Wireless sensor networks (WSNs) have raised serious concerns in recent years regarding
network connectivity. Multiple attacks occur during network communication, disrupting …
network connectivity. Multiple attacks occur during network communication, disrupting …