26   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Jing Chen, Tong Li and Rui Zhu    
False messages sent by malicious or selfish vehicle nodes will reduce the operation efficiency of the Internet of Vehicles, and can even endanger drivers in serious cases. Therefore, it is very important to detect malicious vehicle nodes in the network i... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nandoori Srikanth,Muktyala Siva Ganga Prasad    
Random deployment of sensor nodes, energy limitations, interference of wireless links, and exposed nodes, are the major reasons of performance degradation in WSN. Energy efficiency, Lifetime improvements are the key research areas from last few decades. ... ver más

 
en línea
Sung Yul Lim and Yoon-Hwa Choi    
-
Revista: Journal of Sensor and Actuator Networks    Formato: Electrónico

 
en línea
Ruki Harwahyu,Boma A. Adhi,Harris Simaremare,Abdusy Syarif,Abdelhafid Abouaissa,Riri F. Sari,Pascal Lorenz     Pág. 110 - 116
A node in Mobile Ad-hoc Network (MANET) solely depends on neighbor nodes for its connectivity to the outer networks. It is completely different with fixed network connection where a central infrastructure is providing connectivity to the outside network ... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Muhsen Alkhalidy, Atalla Fahed Al-Serhan, Ayoub Alsarhan and Bashar Igried    
Vehicular ad hoc networks have played a key role in intelligent transportation systems that considerably improve road safety and management. This new technology allows vehicles to communicate and share road information. However, malicious users may injec... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Abdelaziz TAMI,Sofiane BOUKLI HACENE,Moussa ALI CHERIF     Pág. 1 - 12
Mobile ad-hoc network is a collection of dynamically organized nodes where each node acts as a host and router. Mobile ad-hoc networks are characterized by the lack of preexisting infrastructures or centralized administration. So, they are vulnerable to ... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Baocheng Wang, Zetao Li and Haibin Li    
As the core of blockchain technology, the consensus algorithm plays an important role in determining the security, data consistency, and efficiency of blockchain systems. The existing mainstream consensus algorithm is experiencing difficulties satisfying... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Tongyang Xu, Yuan Liu, Zhaotai Ma, Yiqiang Huang and Peng Liu    
As a new distributed machine learning (ML) approach, federated learning (FL) shows great potential to preserve data privacy by enabling distributed data owners to collaboratively build a global model without sharing their raw data. However, the heterogen... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Claudio Marche and Michele Nitti    
The Internet of Things is enriching our life with an ecosystem of interconnected devices. Object cooperation allows us to develop complex applications in which each node contributes one or more services. Therefore, the information moves from a provider t... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Wenjuan Li, Weizhi Meng and Lam For Kwok    
Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing int... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Wenjuan Li, Weizhi Meng and Lam For Kwok    
Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing int... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Khalid Hussain Mohammadani, Muhammad Salman Pathan, Muhammad Iftikhar Hussain and Muhammad Qasim Memon    
A mobile ad-hoc network (MANET) is a temporary network of wireless mobile nodes. In a MANET, it is assumed that all of the nodes cooperate with each other to transfer data packets in a multi-hop fashion. However, some malicious nodes don?t cooperate with... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Adam Rapley, Xavier Bellekens, Lynsay A. Shepherd and Colin McLean    
Writing desktop applications in JavaScript offers developers the opportunity to create cross-platform applications with cutting-edge capabilities. However, in doing so, they are potentially submitting their code to a number of unsanctioned modifications ... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Jinhua Ma, Zhide Chen, Jianghua Liu and Rongjun Zheng    
With the rapid development of M2M (Machine-to-Machine) networks, the damages caused by malicious worms are getting more and more serious. By considering the influences of the network heterogeneity on worm spreading, we are the first to study the complex ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Shabir Ahmad Sofi, Roohie Naaz     Pág. 113 - 118
Ad Hoc wireless sensor network (WSN) is a collection of nodes that do not need to rely on predefined infrastructure to keep the network connected. The level of security and performance are always somehow related to each other, therefore due to limited re... ver más
Revista: Advances in Technology Innovation    Formato: Electrónico

 
en línea
Muaayed Al-Rawi     Pág. 73 - 76
Mobile ad-hoc network (MANET) security is the most significant importance for the infrastructure working of network. Privacy and integrity of the information, network services can be accomplished by guaranteeing that security issues. The mobile ad hoc ne... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Zhijun Wu, Shengyan Zhou, Liang Liu and Jin Lei    
Air traffic management (ATM) plays an important role in maintaining and promoting air traffic safety, maintaining air traffic order and ensuring smooth air traffic. As the core of air traffic management, it is essential to ensure the safe and stable oper... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Rezvan Almas Shehni, Karim Faez, Farshad Eshghi and Manoochehr Kelarestaghi    
Wide-spread deployment of Wireless Sensor Networks (WSN) necessitates special attention to security issues, amongst which Sybil attacks are the most important ones. As a core to Sybil attacks, malicious nodes try to disrupt network operations by creating... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Rezvan Almas Shehni, Karim Faez, Farshad Eshghi and Manoochehr Kelarestaghi    
Wide-spread deployment of Wireless Sensor Networks (WSN) necessitates special attention to security issues, amongst which Sybil attacks are the most important ones. As a core to Sybil attacks, malicious nodes try to disrupt network operations by creating... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Wangxi Jiang, Xiaoxiong Wu, Mingyang Song, Jiwei Qin and Zhenhong Jia    
Blockchain technology is well known due to the advent of Bitcoin. With the development of recent years, blockchain technology has been widely used in medicine, digital currency, energy, etc. The practical Byzantine fault-tolerant (PBFT) algorithm is a co... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »