A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions
The Internet of Things (IoT) can enable seamless communication between millions of
billions of objects. As IoT applications continue to grow, they face several challenges …
billions of objects. As IoT applications continue to grow, they face several challenges …
Trust management system in wireless sensor networks: design considerations and research challenges
Trust is an important factor in wireless sensor networks (WSNs) in terms of security
enhancement and successful collaboration. Trust management (TM) can ensure that all …
enhancement and successful collaboration. Trust management (TM) can ensure that all …
Secret sharing-based energy-aware and multi-hop routing protocol for IoT based WSNs
Internet of Things (IoT) enables modern improvements in smart sensors, RFID, Internet
technologies, and communication protocols. Sensor nodes are treated as smart devices and …
technologies, and communication protocols. Sensor nodes are treated as smart devices and …
Machine Learning for Computer and Cyber Security
BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
TERP: A trust and energy aware routing protocol for wireless sensor network
In most of the applications of wireless sensor networks (WSNs), nodes operate in
unattended environments and are, therefore, vulnerable to variety of attacks. Due to dynamic …
unattended environments and are, therefore, vulnerable to variety of attacks. Due to dynamic …
Exploring the trust management mechanism in self-organizing complex network based on game theory
The trust management mechanism can used to establish cooperation relationship between
nodes and decrease risk caused by the information interaction. In this paper, we propose a …
nodes and decrease risk caused by the information interaction. In this paper, we propose a …
AGEN-AODV: an intelligent energy-aware routing protocol for heterogeneous mobile ad-hoc networks
M Nabati, M Maadani, MA Pourmina - Mobile Networks and Applications, 2022 - Springer
Abstract Mobile Ad-hoc Networks (MANETs) consist of mobile nodes that usually have
limited energy resources. MANET routing protocols should consider the dynamics and …
limited energy resources. MANET routing protocols should consider the dynamics and …
Bio-inspired multilevel security protocol for data aggregation and routing in IoT WSNs
N Chandnani, CN Khairnar - Mobile Networks and Applications, 2022 - Springer
The resource limitation and unreliability of IoT WSN makes the sensors susceptible to a lot of
malicious attacks. In this research work, we propose ANT Particle Swarm Optimization …
malicious attacks. In this research work, we propose ANT Particle Swarm Optimization …
A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks
AR Rajeswari, K Kulothungan, S Ganapathy… - Peer-to-Peer Networking …, 2019 - Springer
Abstract Mobile Ad-hoc Networks have distinct characteristics namely lack of centralized
control and management, severe resource constraints in terms of energy level of nodes …
control and management, severe resource constraints in terms of energy level of nodes …
Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET
The recent development in wireless communication technology and portable devices has
led to the development of Mobile Ad-Hoc Network which has unique features such as …
led to the development of Mobile Ad-Hoc Network which has unique features such as …