Zobrazeno 1 - 10
of 320
pro vyhledávání: '"KI IL Kim"'
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2024, Iss 1, Pp 1-39 (2024)
Abstract The expansion of wireless communication introduces security vulnerabilities, emphasizing the essential need for secure systems that prioritize confidentiality, integrity, and other key aspects of data protection. Since computational security
Externí odkaz:
https://doaj.org/article/3c28c1d07c844c46a5eb920e6d0ae231
Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-22 (2024)
Abstract The wormhole attack is one of the most treacherous attacks projected at the routing layer that can bypass cryptographic measures and derail the entire communication network. It is too difficult to prevent a priori; all the possible counterme
Externí odkaz:
https://doaj.org/article/110de36442c14269811771f0e4cc6a52
Publikováno v:
IEEE Access, Vol 12, Pp 49134-49150 (2024)
Real-time systems mostly interact with the external world and each input operation must meet predetermined deadlines to be useful. However, in many real-time applications, a partial result is also acceptable. We developed a reward-based mixed critica
Externí odkaz:
https://doaj.org/article/d7eb1e36d1c04742810959c0eca886b2
Autor:
David Samuel Bhatti, Muhammad Mueed Hussain, Beomkyu Suh, Zulfiqar Ali, Ismatov Akobir, Ki-Il Kim
Publikováno v:
IEEE Access, Vol 12, Pp 46690-46703 (2024)
Since its inception more than a decade ago, Internet of Things (IoT) technology has been guiding people in the development of a world full of smart solutions in which all devices and physical objects, represented as “things,” are interlinked with
Externí odkaz:
https://doaj.org/article/940e377350d24d22936f2e09e328ff97
Autor:
David Samuel Bhatti, Shahzad Saleem, Zulfiqar Ali, Tae-Jin Park, Beomkyu Suh, Ali Kamran, William J. Buchanan, Ki-Il Kim
Publikováno v:
IEEE Access, Vol 12, Pp 41499-41516 (2024)
Wireless Sensor Networks (WSN) are deployed on a large scale and require protection from malicious energy drainage attacks, particularly those directed at the routing layer. The complexity increases during critical operations like cluster head select
Externí odkaz:
https://doaj.org/article/3d54173f5e0b45f68e02b5c757a27afe
Autor:
Ki‐Il Kim, Aswani Kumar Cherukuri, Xue Jun Li, Tanveer Ahmad, Muhammad Rafiq, Shehzad Ashraf Chaudhry
Publikováno v:
CAAI Transactions on Intelligence Technology, Vol 8, Iss 4, Pp 1101-1103 (2023)
Externí odkaz:
https://doaj.org/article/6ca909537aff4684a1e28a9f019e88c4
Autor:
David Samuel Bhatti, Salbia Sidrat, Shahzad Saleem, Annas Wasim Malik, BeomKyu Suh, Ki-Il Kim, Kyu-Chul Lee
Publikováno v:
PLoS ONE, Vol 19, Iss 1 (2024)
Externí odkaz:
https://doaj.org/article/ff22742d18704d93bbaa1dd81be3ea55
Publikováno v:
Sensors, Vol 24, Iss 7, p 2054 (2024)
This study enhances infrared communication security in nuclear power plants’ secondary systems, addressing the risk of mechanical and cyber failures. A novel random address generator, employing an innovative S-box, was developed to secure IoT senso
Externí odkaz:
https://doaj.org/article/71997b8d21fc4da48e4661332357f56a
Publikováno v:
IEEE Access, Vol 11, Pp 79265-79274 (2023)
Secure exchange of sensitive information between different entities is a serious challenge in today’s environment. Therefore, various cryptosystems have been created specifically for this purpose. Various operations are used in these cryptosystems.
Externí odkaz:
https://doaj.org/article/2316c881dc1e4bf2a7e171d93cacaf86
Publikováno v:
Heliyon, Vol 9, Iss 6, Pp e17580- (2023)
Fifth generation (5G) wireless networks are based on the use of spectrum blocks above 6 GHz in the millimeter wave (mmWave) range to increase throughput and reduce the overall level of interference in very busy frequency bands below 6 GHz. With the g
Externí odkaz:
https://doaj.org/article/12be7bfa077e438ab2b70e67208be2a1