Sinkhole attacks in wireless sensor networks: A survey

A Rehman, SU Rehman, H Raheem - Wireless Personal Communications, 2019 - Springer
Wireless sensor networks (WSNs) consist of a large number of nodes, communicating
sensor readings to the base stations through other nodes. Due to their energy limitations …

Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks

KH Mohammadani, KA Memon… - International …, 2020 - journals.sagepub.com
Mobile ad hoc networks are the “spontaneous networks” which create a temporary network
in any place and any time without using any extra fixed radio device of a full infrastructure …

Classification of security attacks in WSNs and possible countermeasures: a survey

S Sharma, A Yadav, M Panchal… - … on advanced networks …, 2019 - ieeexplore.ieee.org
Wireless sensor networks are best known for their applications in continuous monitoring of
physical parameters and in network processing capabilities. However, a WSN is vulnerable …

Cloud Computing Services for Distributed Mobile Users and Blockchain Technology

R Salama, S Alturjman, C Altrjman… - NEU Journal for …, 2023 - dergi.neu.edu.tr
Blockchain technology and distributed mobile cloud computing are two new technologies
that have the potential to change how we interact with mobile devices and cloud services …

Mobile cloud computing and the internet of things security and privacy

R Salama, F Al-Turjman - NEU Journal for Artificial Intelligence and …, 2023 - dergi.neu.edu.tr
In the quickly changing world of mobile cloud computing and the Internet of Things (IoT),
security and privacy are top priorities. The need to safeguard sensitive data and maintain …

Deep Learning Based Analysis and Detection of Potato Leaf Disease

R Kumar, M Gupta, R Kathait - NEU Journal for Artificial …, 2023 - dergi.neu.edu.tr
Potato is an essential crop worldwide, and its leaves are prone to numerous illnesses,
including early and late blight. Accurately detecting these diseases can help farmers prevent …

[PDF][PDF] Challenges in Sinkhole Attack Detection in Wireless Sensor Network

A Waoo, V Tiwari - Indian J. Data Commun. Netw., 2021 - ijdcn.latticescipub.com
Wireless sensor networks (WSN's) comprise limited energy small sensor nodes having the
ability to monitor the physical conditions and communicate information among the various …

Comparative Analysis of Secure Range Free DV-Hop Localization algorithms against wormhole attack in WSNs

R Garg, T Gulati - 2024 2nd International Conference on …, 2024 - ieeexplore.ieee.org
Node localization is a requisite in wireless sensor networks (WSNs) because of their far-
reaching applications in many fields like surveillance, tracking, security, etc. A major …

LDAP DDoS attack detection using SVM with different kernel functions

K Dasari, S Mekala, S Mekhale, S Bijja - AIP Conference Proceedings, 2024 - pubs.aip.org
Distributed Denial of Service (DDoS) is one of the key cyber-attack nowadays. DDoS attacks
disrupt the target systems to unavailable to the legitimate users. Lightweight Directory …

Blockchain and Green Mobile Cloud Computing

R Salama, S Alturjman, C Altrjman… - NEU Journal for …, 2023 - dergi.neu.edu.tr
The project's goal is to create a framework for green mobile cloud computing that makes use
of blockchain technology to manage energy effectively. The suggested framework will let …