|
|
|
Jing Chen, Tong Li and Rui Zhu
False messages sent by malicious or selfish vehicle nodes will reduce the operation efficiency of the Internet of Vehicles, and can even endanger drivers in serious cases. Therefore, it is very important to detect malicious vehicle nodes in the network i...
ver más
|
|
|
|
|
|
|
Nandoori Srikanth,Muktyala Siva Ganga Prasad
Random deployment of sensor nodes, energy limitations, interference of wireless links, and exposed nodes, are the major reasons of performance degradation in WSN. Energy efficiency, Lifetime improvements are the key research areas from last few decades. ...
ver más
|
|
|
|
|
|
|
Sung Yul Lim and Yoon-Hwa Choi
-
|
|
|
|
|
|
|
Ruki Harwahyu,Boma A. Adhi,Harris Simaremare,Abdusy Syarif,Abdelhafid Abouaissa,Riri F. Sari,Pascal Lorenz
Pág. 110 - 116
A node in Mobile Ad-hoc Network (MANET) solely depends on neighbor nodes for its connectivity to the outer networks. It is completely different with fixed network connection where a central infrastructure is providing connectivity to the outside network ...
ver más
|
|
|
|
|
|
|
Muhsen Alkhalidy, Atalla Fahed Al-Serhan, Ayoub Alsarhan and Bashar Igried
Vehicular ad hoc networks have played a key role in intelligent transportation systems that considerably improve road safety and management. This new technology allows vehicles to communicate and share road information. However, malicious users may injec...
ver más
|
|
|
|
|
|
|
Abdelaziz TAMI,Sofiane BOUKLI HACENE,Moussa ALI CHERIF
Pág. 1 - 12
Mobile ad-hoc network is a collection of dynamically organized nodes where each node acts as a host and router. Mobile ad-hoc networks are characterized by the lack of preexisting infrastructures or centralized administration. So, they are vulnerable to ...
ver más
|
|
|
|
|
|
|
Baocheng Wang, Zetao Li and Haibin Li
As the core of blockchain technology, the consensus algorithm plays an important role in determining the security, data consistency, and efficiency of blockchain systems. The existing mainstream consensus algorithm is experiencing difficulties satisfying...
ver más
|
|
|
|
|
|
|
Tongyang Xu, Yuan Liu, Zhaotai Ma, Yiqiang Huang and Peng Liu
As a new distributed machine learning (ML) approach, federated learning (FL) shows great potential to preserve data privacy by enabling distributed data owners to collaboratively build a global model without sharing their raw data. However, the heterogen...
ver más
|
|
|
|
|
|
|
Claudio Marche and Michele Nitti
The Internet of Things is enriching our life with an ecosystem of interconnected devices. Object cooperation allows us to develop complex applications in which each node contributes one or more services. Therefore, the information moves from a provider t...
ver más
|
|
|
|
|
|
|
Wenjuan Li, Weizhi Meng and Lam For Kwok
Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing int...
ver más
|
|
|
|
|
|
|
Wenjuan Li, Weizhi Meng and Lam For Kwok
Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing int...
ver más
|
|
|
|
|
|
|
Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Khalid Hussain Mohammadani, Muhammad Salman Pathan, Muhammad Iftikhar Hussain and Muhammad Qasim Memon
A mobile ad-hoc network (MANET) is a temporary network of wireless mobile nodes. In a MANET, it is assumed that all of the nodes cooperate with each other to transfer data packets in a multi-hop fashion. However, some malicious nodes don?t cooperate with...
ver más
|
|
|
|
|
|
|
Adam Rapley, Xavier Bellekens, Lynsay A. Shepherd and Colin McLean
Writing desktop applications in JavaScript offers developers the opportunity to create cross-platform applications with cutting-edge capabilities. However, in doing so, they are potentially submitting their code to a number of unsanctioned modifications ...
ver más
|
|
|
|
|
|
|
Jinhua Ma, Zhide Chen, Jianghua Liu and Rongjun Zheng
With the rapid development of M2M (Machine-to-Machine) networks, the damages caused by malicious worms are getting more and more serious. By considering the influences of the network heterogeneity on worm spreading, we are the first to study the complex ...
ver más
|
|
|
|
|
|
|
Shabir Ahmad Sofi, Roohie Naaz
Pág. 113 - 118
Ad Hoc wireless sensor network (WSN) is a collection of nodes that do not need to rely on predefined infrastructure to keep the network connected. The level of security and performance are always somehow related to each other, therefore due to limited re...
ver más
|
|
|
|
|
|
|
Muaayed Al-Rawi
Pág. 73 - 76
Mobile ad-hoc network (MANET) security is the most significant importance for the infrastructure working of network. Privacy and integrity of the information, network services can be accomplished by guaranteeing that security issues. The mobile ad hoc ne...
ver más
|
|
|
|
|
|
|
Zhijun Wu, Shengyan Zhou, Liang Liu and Jin Lei
Air traffic management (ATM) plays an important role in maintaining and promoting air traffic safety, maintaining air traffic order and ensuring smooth air traffic. As the core of air traffic management, it is essential to ensure the safe and stable oper...
ver más
|
|
|
|
|
|
|
Rezvan Almas Shehni, Karim Faez, Farshad Eshghi and Manoochehr Kelarestaghi
Wide-spread deployment of Wireless Sensor Networks (WSN) necessitates special attention to security issues, amongst which Sybil attacks are the most important ones. As a core to Sybil attacks, malicious nodes try to disrupt network operations by creating...
ver más
|
|
|
|
|
|
|
Rezvan Almas Shehni, Karim Faez, Farshad Eshghi and Manoochehr Kelarestaghi
Wide-spread deployment of Wireless Sensor Networks (WSN) necessitates special attention to security issues, amongst which Sybil attacks are the most important ones. As a core to Sybil attacks, malicious nodes try to disrupt network operations by creating...
ver más
|
|
|
|
|
|
|
Wangxi Jiang, Xiaoxiong Wu, Mingyang Song, Jiwei Qin and Zhenhong Jia
Blockchain technology is well known due to the advent of Bitcoin. With the development of recent years, blockchain technology has been widely used in medicine, digital currency, energy, etc. The practical Byzantine fault-tolerant (PBFT) algorithm is a co...
ver más
|
|
|
|