Sinkhole attacks in wireless sensor networks: A survey
Wireless sensor networks (WSNs) consist of a large number of nodes, communicating
sensor readings to the base stations through other nodes. Due to their energy limitations …
sensor readings to the base stations through other nodes. Due to their energy limitations …
Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks
KH Mohammadani, KA Memon… - International …, 2020 - journals.sagepub.com
Mobile ad hoc networks are the “spontaneous networks” which create a temporary network
in any place and any time without using any extra fixed radio device of a full infrastructure …
in any place and any time without using any extra fixed radio device of a full infrastructure …
Classification of security attacks in WSNs and possible countermeasures: a survey
Wireless sensor networks are best known for their applications in continuous monitoring of
physical parameters and in network processing capabilities. However, a WSN is vulnerable …
physical parameters and in network processing capabilities. However, a WSN is vulnerable …
Cloud Computing Services for Distributed Mobile Users and Blockchain Technology
R Salama, S Alturjman, C Altrjman… - NEU Journal for …, 2023 - dergi.neu.edu.tr
Blockchain technology and distributed mobile cloud computing are two new technologies
that have the potential to change how we interact with mobile devices and cloud services …
that have the potential to change how we interact with mobile devices and cloud services …
Mobile cloud computing and the internet of things security and privacy
R Salama, F Al-Turjman - NEU Journal for Artificial Intelligence and …, 2023 - dergi.neu.edu.tr
In the quickly changing world of mobile cloud computing and the Internet of Things (IoT),
security and privacy are top priorities. The need to safeguard sensitive data and maintain …
security and privacy are top priorities. The need to safeguard sensitive data and maintain …
Deep Learning Based Analysis and Detection of Potato Leaf Disease
R Kumar, M Gupta, R Kathait - NEU Journal for Artificial …, 2023 - dergi.neu.edu.tr
Potato is an essential crop worldwide, and its leaves are prone to numerous illnesses,
including early and late blight. Accurately detecting these diseases can help farmers prevent …
including early and late blight. Accurately detecting these diseases can help farmers prevent …
[PDF][PDF] Challenges in Sinkhole Attack Detection in Wireless Sensor Network
Wireless sensor networks (WSN's) comprise limited energy small sensor nodes having the
ability to monitor the physical conditions and communicate information among the various …
ability to monitor the physical conditions and communicate information among the various …
Comparative Analysis of Secure Range Free DV-Hop Localization algorithms against wormhole attack in WSNs
R Garg, T Gulati - 2024 2nd International Conference on …, 2024 - ieeexplore.ieee.org
Node localization is a requisite in wireless sensor networks (WSNs) because of their far-
reaching applications in many fields like surveillance, tracking, security, etc. A major …
reaching applications in many fields like surveillance, tracking, security, etc. A major …
LDAP DDoS attack detection using SVM with different kernel functions
Distributed Denial of Service (DDoS) is one of the key cyber-attack nowadays. DDoS attacks
disrupt the target systems to unavailable to the legitimate users. Lightweight Directory …
disrupt the target systems to unavailable to the legitimate users. Lightweight Directory …
Blockchain and Green Mobile Cloud Computing
R Salama, S Alturjman, C Altrjman… - NEU Journal for …, 2023 - dergi.neu.edu.tr
The project's goal is to create a framework for green mobile cloud computing that makes use
of blockchain technology to manage energy effectively. The suggested framework will let …
of blockchain technology to manage energy effectively. The suggested framework will let …