Survey on Multi-Document Summarization: Systematic Literature Review

U Ihsan, H Ashraf, NZ Jhanjhi - arXiv preprint arXiv:2312.12915, 2023 - arxiv.org
In this era of information technology, abundant information is available on the internet in the
form of web pages and documents on any given topic. Finding the most relevant and …

Secure Authentication Mechanism for Cluster based Vehicular Adhoc Network (VANET): A Survey

R Nasir, H Ashraf, NZ Jhanjhi - arXiv preprint arXiv:2312.12925, 2023 - arxiv.org
Vehicular Ad Hoc Networks (VANETs) play a crucial role in Intelligent Transportation
Systems (ITS) by facilitating communication between vehicles and infrastructure. This …

Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions

DS Bhatti, S Saleem, A Imran, HJ Kim, KI Kim… - Scientific Reports, 2024 - nature.com
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographic measures and derail the entire communication network. It is …

[PDF][PDF] Current Security Threats in Applications of Wireless Sensor Network

A John, IF Isnin, SHH Madni - International Journal on Engineering …, 2023 - academia.edu
Wireless Sensor Networks (WSNs) are either homogeneous or heterogeneous, depending
on whether the network is made up of distributed nodes with the same properties; …

Secured Data Sharing Method for Wireless Communication Network Based on Digital Twin and Merkle Hash Tree

D Chen, A Aljohani - Mobile Networks and Applications, 2024 - Springer
Data protection shares sensitive data with authorized users over a wireless communication
network (WCN). To protect the data, a secured sharing method for WCNs is required, which …

Reshaping Cybersecurity of Wireless Sensor Networks Using Energy-Optimized Approach Against Wormhole Attack

H Shahid, H Ashraf, NZ Jhanjhi… - … With Generative AI …, 2025 - igi-global.com
Security is a major problem in wireless sensor networks (WSN) because they are vulnerable
to a variety of dangerous threats, the deadliest of which is the wormhole assault. These …

ESPAR array design for the UHF RFID wireless sensor communication system

MM Rahman, HG Ryu - International Journal of Communication …, 2023 - Wiley Online Library
In this paper, in order to improve the received signal strength (RSS) and signal quality, three
arrays of electronically steerable parasitic array radiator (ESPAR) antennas are suggested …

ML-Based Detection of Sybil Attack on MANETS

H Ashraf, M Nawaz, NZ Jhanjhi - 2024 - preprints.org
Abstract Mobile Ad hoc Networks (MANETs) play an important role in the technological era
by enabling wireless communication in dynamic and infrastructure-free contexts. Because of …

Query Reformulation Approach Using Domain Specific Ontology

A Javed, H Ashraf, NZ Jhanjhi - 2024 - preprints.org
Query reformulation is a fundamental task in information retrieval systems aimed at
improving the accuracy and relevance of search results. This abstract presents a query …

Comparative Analysis of Secure Range Free DV-Hop Localization algorithms against wormhole attack in WSNs

R Garg, T Gulati - 2024 2nd International Conference on …, 2024 - ieeexplore.ieee.org
Node localization is a requisite in wireless sensor networks (WSNs) because of their far-
reaching applications in many fields like surveillance, tracking, security, etc. A major …