Zobrazeno 1 - 10
of 14
pro vyhledávání: '"David Samuel Bhatti"'
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2024, Iss 1, Pp 1-39 (2024)
Abstract The expansion of wireless communication introduces security vulnerabilities, emphasizing the essential need for secure systems that prioritize confidentiality, integrity, and other key aspects of data protection. Since computational security
Externí odkaz:
https://doaj.org/article/3c28c1d07c844c46a5eb920e6d0ae231
Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-22 (2024)
Abstract The wormhole attack is one of the most treacherous attacks projected at the routing layer that can bypass cryptographic measures and derail the entire communication network. It is too difficult to prevent a priori; all the possible counterme
Externí odkaz:
https://doaj.org/article/110de36442c14269811771f0e4cc6a52
Autor:
David Samuel Bhatti, Muhammad Mueed Hussain, Beomkyu Suh, Zulfiqar Ali, Ismatov Akobir, Ki-Il Kim
Publikováno v:
IEEE Access, Vol 12, Pp 46690-46703 (2024)
Since its inception more than a decade ago, Internet of Things (IoT) technology has been guiding people in the development of a world full of smart solutions in which all devices and physical objects, represented as “things,” are interlinked with
Externí odkaz:
https://doaj.org/article/940e377350d24d22936f2e09e328ff97
Autor:
David Samuel Bhatti, Shahzad Saleem, Zulfiqar Ali, Tae-Jin Park, Beomkyu Suh, Ali Kamran, William J. Buchanan, Ki-Il Kim
Publikováno v:
IEEE Access, Vol 12, Pp 41499-41516 (2024)
Wireless Sensor Networks (WSN) are deployed on a large scale and require protection from malicious energy drainage attacks, particularly those directed at the routing layer. The complexity increases during critical operations like cluster head select
Externí odkaz:
https://doaj.org/article/3d54173f5e0b45f68e02b5c757a27afe
Autor:
David Samuel Bhatti, Salbia Sidrat, Shahzad Saleem, Annas Wasim Malik, BeomKyu Suh, Ki-Il Kim, Kyu-Chul Lee
Publikováno v:
PLoS ONE, Vol 19, Iss 1 (2024)
Externí odkaz:
https://doaj.org/article/ff22742d18704d93bbaa1dd81be3ea55
Publikováno v:
IEEE Access, Vol 11, Pp 79265-79274 (2023)
Secure exchange of sensitive information between different entities is a serious challenge in today’s environment. Therefore, various cryptosystems have been created specifically for this purpose. Various operations are used in these cryptosystems.
Externí odkaz:
https://doaj.org/article/2316c881dc1e4bf2a7e171d93cacaf86
Autor:
Annas Wasim Malik, David Samuel Bhatti, Tae-Jin Park, Hafiz Usama Ishtiaq, Jae-Cheol Ryou, Ki-Il Kim
Publikováno v:
Sensors, Vol 24, Iss 2, p 433 (2024)
Cloud computing technology is rapidly becoming ubiquitous and indispensable. However, its widespread adoption also exposes organizations and individuals to a broad spectrum of potential threats. Despite the multiple advantages the cloud offers, organ
Externí odkaz:
https://doaj.org/article/58d526980d4244e0ad995ddc2959a8ec
Autor:
David Samuel Bhatti, Shahzad Saleem
Publikováno v:
IEEE Access, Vol 8, Pp 24242-24257 (2020)
Mobile ad hoc networks consist of wireless nodes and can be established quickly with minimal configuration and cost, because, they do not require any infrastructure in advance. Civil and military applications are using them extensively in emergency a
Externí odkaz:
https://doaj.org/article/876c61e0410f4947be553ff8085afe00
Autor:
David Samuel Bhatti, Shahzad Saleem, Azhar Imran, Zafar Iqbal, Abdulkareem Alzahrani, HyunJung Kim, Ki-Il Kim
Publikováno v:
Sensors, Vol 22, Iss 20, p 7722 (2022)
The deployment of wearable or body-worn devices is increasing rapidly, and thus researchers’ interests mainly include technical and economical issues, such as networking, interoperability, security, power optimization, business growth and regulatio
Externí odkaz:
https://doaj.org/article/d844df34113e4c768435e0057f2b111a
The wormhole attack is one of the most treacherous attacks projected at the routing layer that can bypass cryptographicmeasures and derail the entire communication network. It is too difficult to prevent a priori; all the possible countermeasures are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0469ac8fa0b4810016b14a4e2ffd6269
https://doi.org/10.21203/rs.3.rs-2948039/v1
https://doi.org/10.21203/rs.3.rs-2948039/v1