Slime mould algorithm based fuzzy linear CFO estimation in wireless sensor networks
Orthogonal Frequency-Division Multiplexing (OFDM) is a form of digital systems and a way
of encoding digital data across multiple frequency components that is used in …
of encoding digital data across multiple frequency components that is used in …
Security Concerns with IoT Routing: A Review of Attacks, Countermeasures, and Future Prospects
AMA Abuagoub - Advances in Internet of Things, 2024 - scirp.org
Today's Internet of Things (IoT) application domains are widely distributed, which exposes
them to several security risks and assaults, especially when data is being transferred …
them to several security risks and assaults, especially when data is being transferred …
Artificial neural network-based mechanism to detect security threats in wireless sensor networks
Wireless sensor networks (WSNs) are essential in many areas, from healthcare to
environmental monitoring. However, WSNs are vulnerable to routing attacks that might …
environmental monitoring. However, WSNs are vulnerable to routing attacks that might …
Security Challenges in Wireless Sensor Network: Current Status and Future Trends
GM Ram, E Ilavarasan - Wireless Personal Communications, 2024 - Springer
WSNs have several applications in the military, the environment, and medicine. These
applications often involve tracking sensor data, such as the actions of enemies on the …
applications often involve tracking sensor data, such as the actions of enemies on the …
Cost-Effective Signcryption for Securing IoT: A Novel Signcryption Algorithm Based on Hyperelliptic Curves
Security and efficiency remain a serious concern for Internet of Things (IoT) environments
due to the resource-constrained nature and wireless communication. Traditional schemes …
due to the resource-constrained nature and wireless communication. Traditional schemes …
Towards Mitigating Jellyfish Attacks Based on Honesty Metrics in V2X Autonomous Networks
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due
to the distinct characteristics of such networks, such as their highly dynamic topology and …
to the distinct characteristics of such networks, such as their highly dynamic topology and …
Game-Theoretic Defense Strategies for Mitigating Gray Hole Attacks on Energy-Limited Sensors in Wireless Sensor Networks
ICK Sihomnou, A Benslimane… - 2024 International …, 2024 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) have improved efficiency and accuracy in various
applications, including military and healthcare. However, gray hole attacks are damaging …
applications, including military and healthcare. However, gray hole attacks are damaging …
Enhancing MANETs Security Against Black Hole Attacks through Time-Based Node Analysis in AOMDV Protocol
AA Naji, MA Saeed, AH Almagashi… - … on Emerging Smart …, 2024 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) rely solely on direct node communication and function
without a fixed infrastructure. Due to their decentralized design, they are susceptible to …
without a fixed infrastructure. Due to their decentralized design, they are susceptible to …
Assessing Implications of Black Hole Attacks on VANET Performance
NT Yang, SFA Razak, S Yogarayan… - … Cloud Computing, and …, 2024 - ieeexplore.ieee.org
VANET safety and security are critical for optimizing road traffic and reducing accidents.
Vehicles travel between locations on a dynamic basis, and because there is minimum level …
Vehicles travel between locations on a dynamic basis, and because there is minimum level …
Enhancing Intrusion Detection in IoT Systems Through Simulated Attack Scenarios
Abstract The Internet of Things (IoT) landscape is fraught with vulnerabilities, making it a
prime target for various types of attacks. While existing literature has extensively explored …
prime target for various types of attacks. While existing literature has extensively explored …