Zobrazeno 1 - 10
of 797
pro vyhledávání: '"Malicious Node"'
Autor:
V. Chandrasekar, V. Shanmugavalli, T. R. Mahesh, R. Shashikumar, Naiwrita Borah, V. Vinoth Kumar, Suresh Guluwadi
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-16 (2024)
Abstract In wireless networking, the security of flying ad hoc networks (FANETs) is a major issue, and the use of drones is growing every day. A distributed network is created by a drone network in which nodes can enter and exit the network at any ti
Externí odkaz:
https://doaj.org/article/ed193b47338e47b5978dd28d39acff0e
Autor:
Premalatha B, Prakasam P, Ph.D
Publikováno v:
Results in Engineering, Vol 22, Iss , Pp 102197- (2024)
Based on trust management, the service establishment between IoT/User devices and fog networks reduces the impact of malicious data and nodes. Hence, building a trusted environment in the IoT and fog layers is very important. There is no assurance th
Externí odkaz:
https://doaj.org/article/fc75138f156a4c988f2584a2bd2ea1b7
Publikováno v:
PeerJ Computer Science, Vol 10, p e2108 (2024)
With the development of technology, more and more devices are connected to the Internet. According to statistics, Internet of Things (IoT) devices have reached tens of billions of units, which forms a massive Internet of Things system. Social Interne
Externí odkaz:
https://doaj.org/article/7fbd2632654a4c1eaffbbf27026d010e
Autor:
Zabeehullah, Fahim Arif, Nauman Ali Khan, Javed Iqbal, Faten Khalid Karim, Nisreen Innab, Samih M. Mostafa
Publikováno v:
IEEE Access, Vol 12, Pp 60568-60587 (2024)
The Internet of Things (IoT) is an emerging technology that allow smart devices to communicate through various heterogeneous channels (wired or wireless). However, for conventional networks, it has become a challenging task to efficiently control and
Externí odkaz:
https://doaj.org/article/af3f77309646486ca9604a788b74c485
Publikováno v:
IEEE Access, Vol 12, Pp 58836-58850 (2024)
An extensive worldwide network known as the Internet of Things (IoT) links different electronic devices and facilitates easy communication and group work. This interdependency is especially apparent in Low Power and Lossy Networks (LLNs), where resou
Externí odkaz:
https://doaj.org/article/416adc4b03574839b0c4e30ce27d6b4b
Autor:
Yanan Jiang, Hui Xia
Publikováno v:
High-Confidence Computing, Vol 4, Iss 1, Pp 100185- (2024)
Dynamic graph neural networks (DGNNs) have demonstrated their extraordinary value in many practical applications. Nevertheless, the vulnerability of DNNs is a serious hidden danger as a small disturbance added to the model can markedly reduce its per
Externí odkaz:
https://doaj.org/article/ac7636b5334f49a595c67ef95105c2d4
Publikováno v:
Automatika, Vol 64, Iss 4, Pp 996-1009 (2023)
Mobile Ad-hoc Networks (MANETs) are wireless networks formed dynamically by connecting or leaving nodes to and from the network without any fixed infrastructure. These categories of wireless networks are susceptible to different attacks based on thei
Externí odkaz:
https://doaj.org/article/da9fc0282da04894ad5801114e986103
Publikováno v:
Sensors, Vol 24, Iss 12, p 3712 (2024)
Cybersecurity has become a major concern in the modern world due to our heavy reliance on cyber systems. Advanced automated systems utilize many sensors for intelligent decision-making, and any malicious activity of these sensors could potentially le
Externí odkaz:
https://doaj.org/article/18f945e83684498eb283f8f6435e48df
Publikováno v:
IEEE Access, Vol 11, Pp 68243-68256 (2023)
Vehicle Ad Hoc Networks (VANETs) can help reduce traffic accidents and improve road safety by broadcasting Emergency Messages (EMs) between vehicles in advance so that the vehicle can take action to avoid accidents. However, its advantages are often
Externí odkaz:
https://doaj.org/article/3ec41429b29e4170b449c3aa974514f9
Autor:
Joonsu Ryu, Sungwook Kim
Publikováno v:
IEEE Access, Vol 11, Pp 47701-47711 (2023)
Irrespective of whether the environment is wired or wireless, routing is an important challenge in networks. Since mobile ad hoc networks (MANETs) are flexible and decentralized wireless networks, routing is very difficult. Furthermore, malicious nod
Externí odkaz:
https://doaj.org/article/aef691bd8eea4d78afb2468ff12d94f0