An overview of cyber threats, attacks and countermeasures on the primary domains of smart cities

V Demertzi, S Demertzis, K Demertzis - Applied Sciences, 2023 - mdpi.com
A smart city is where existing facilities and services are enhanced by digital technology to
benefit people and companies. The most critical infrastructures in this city are …

Device blocking tool

R Isola, A Grossi - US Patent 9,736,152, 2017 - Google Patents
Automated locating and disconnection of undesired devices may include receiving a unique
address of a candidate device, determining the address of the switch coupled to the …

A novel taxonomy of black-hole attack detection techniques in mobile Ad-hoc network (MANET)

A Sherif, M Elsabrouty, A Shoukry - 2013 IEEE 16th …, 2013 - ieeexplore.ieee.org
Mobile Ad-Hoc Networks (MANETs) are characterized by the lack of infrastructure, dynamic
topology, and their use of the open wireless medium. Black-hole attack represents a major …

Secure AODV to combat black hole attack in MANET

SS Narayanan, S Radhakrishnan - … International Conference on …, 2013 - ieeexplore.ieee.org
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate
with each other by forming a multi-hop radio network without relying on any standard …

[PDF][PDF] Security challenges & preventions in wireless communications

K Laeeq - International Journal of Scientific and Engineering …, 2011 - academia.edu
Without the need of an infrastructure, low-cost, auto-managed, flexible and low power
consumer, wireless communication is becoming emerging technology. It shows great binder …

[PDF][PDF] An effective CBHDAP protocol for black hole attack detection in manet

K Vijayakumar, K Somasundaram - Indian Journal of Science and …, 2016 - researchgate.net
Objective: The various features of mobile adhoc networks (MANET's) are open medium,
dynamic topology and absence of centralized monitoring point which introduces various …

High performance MCM-D technology

S Kikuchi, H Yamamoto, K Seyama… - Proceedings of IEEE …, 1994 - ieeexplore.ieee.org
FUJITSU has developed an MCM-D technology which uses bare chips on composite thin
films for mounting CMOS chips with high density and low cost. The first use of this …

[PDF][PDF] Performance study of approaches for detecting attacks in ad hoc wireless networks

K Laeeq, K Khan - Journal of Computing, 2011 - researchgate.net
The popularity graph of ad hoc networks are incredibly increasing with the increase of its
utilization in all fields. No messy wired physical infrastructure and other innumerable …

Analysing cross layer performance based on sinking and collision behaviour attack in manet

S Hemalatha, PCS Mahesh… - 2012 International …, 2012 - ieeexplore.ieee.org
Wireless ad-hoc network is a temporary network set up by wireless mobile nodes moving
arbitrary in the places that have no network infrastructure. Since the nodes communicate …

[PDF][PDF] Energy Efficient Way to Detect Black Hole Attack in MANETs

H Kaur, K Mangat - academia.edu
Abstract Mobile Ad hoc Networks (MANETs) consists of mobile nodes that are
interconnected by wireless network interfaces to create a temporary network, each node …