Slime mould algorithm based fuzzy linear CFO estimation in wireless sensor networks

M Prabhu, B Muthu Kumar, A Ahilan - IETE Journal of Research, 2024 - Taylor & Francis
Orthogonal Frequency-Division Multiplexing (OFDM) is a form of digital systems and a way
of encoding digital data across multiple frequency components that is used in …

Security Concerns with IoT Routing: A Review of Attacks, Countermeasures, and Future Prospects

AMA Abuagoub - Advances in Internet of Things, 2024 - scirp.org
Today's Internet of Things (IoT) application domains are widely distributed, which exposes
them to several security risks and assaults, especially when data is being transferred …

Artificial neural network-based mechanism to detect security threats in wireless sensor networks

S Khan, MA Khan, N Alnazzawi - Sensors, 2024 - mdpi.com
Wireless sensor networks (WSNs) are essential in many areas, from healthcare to
environmental monitoring. However, WSNs are vulnerable to routing attacks that might …

Security Challenges in Wireless Sensor Network: Current Status and Future Trends

GM Ram, E Ilavarasan - Wireless Personal Communications, 2024 - Springer
WSNs have several applications in the military, the environment, and medicine. These
applications often involve tracking sensor data, such as the actions of enemies on the …

Cost-Effective Signcryption for Securing IoT: A Novel Signcryption Algorithm Based on Hyperelliptic Curves

J Khan, C Zhu, W Ali, M Asim, S Ahmad - Information, 2024 - mdpi.com
Security and efficiency remain a serious concern for Internet of Things (IoT) environments
due to the resource-constrained nature and wireless communication. Traditional schemes …

Towards Mitigating Jellyfish Attacks Based on Honesty Metrics in V2X Autonomous Networks

M Benguenane, A Korichi, B Brik, N Azzaoui - Applied Sciences, 2023 - mdpi.com
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due
to the distinct characteristics of such networks, such as their highly dynamic topology and …

Game-Theoretic Defense Strategies for Mitigating Gray Hole Attacks on Energy-Limited Sensors in Wireless Sensor Networks

ICK Sihomnou, A Benslimane… - 2024 International …, 2024 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) have improved efficiency and accuracy in various
applications, including military and healthcare. However, gray hole attacks are damaging …

Enhancing MANETs Security Against Black Hole Attacks through Time-Based Node Analysis in AOMDV Protocol

AA Naji, MA Saeed, AH Almagashi… - … on Emerging Smart …, 2024 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) rely solely on direct node communication and function
without a fixed infrastructure. Due to their decentralized design, they are susceptible to …

Assessing Implications of Black Hole Attacks on VANET Performance

NT Yang, SFA Razak, S Yogarayan… - … Cloud Computing, and …, 2024 - ieeexplore.ieee.org
VANET safety and security are critical for optimizing road traffic and reducing accidents.
Vehicles travel between locations on a dynamic basis, and because there is minimum level …

Enhancing Intrusion Detection in IoT Systems Through Simulated Attack Scenarios

M NEILY, F JEMILI, O KORBAA - 2024 - researchsquare.com
Abstract The Internet of Things (IoT) landscape is fraught with vulnerabilities, making it a
prime target for various types of attacks. While existing literature has extensively explored …