Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Nalam Venkata Abhishek"'
Autor:
Nalam Venkata Abhishek, Teng Joon Lim
Publikováno v:
Journal of Communications and Networks. 24:451-462
Publikováno v:
IEEE Internet of Things Journal. 9:3270-3281
The Internet of Vehicles (IoV) may enhance road safety, improve traffic flow, etc. However, internet connected intelligent vehicles (IVs) are vulnerable to cyber-attacks. One of the important challenges in IoV is thus, verifying data integrity with s
Publikováno v:
2023 IEEE 20th Consumer Communications & Networking Conference (CCNC).
Autor:
Nalam Venkata Abhishek, Mohan Gurusamy
Publikováno v:
IEEE Wireless Communications Letters. 10:2210-2214
Vehicular networks, like any other wireless networks, are prone to jamming due to the inherent nature of the wireless environment. In this letter, we consider an attacker who jams the network whenever he observes that a packet is being transmitted, i
Publikováno v:
ICC 2022 - IEEE International Conference on Communications.
Publikováno v:
IEEE Transactions on Information Forensics and Security. 15:435-446
Clustering Internet of Things (IoT) networks, to alleviate the network scalability problem, provides an opportunity for an adversary to compromise a set of nodes by simply compromising the relay they are associated with. In such scenarios, an adversa
Autor:
Praveen Praveen, K. Jayanth Reddy, Nalam Venkata Abhishek, C. Tanishq Raj, A. Yashwanth Reddy
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811653001
Advances in Intelligent Systems and Computing
Advances in Intelligent Systems and Computing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a3914ade98e8f69fd3cdb9922ce104a6
https://doi.org/10.1007/978-981-16-5301-8_43
https://doi.org/10.1007/978-981-16-5301-8_43
Autor:
Cheng Yujun Eugene, Rohini Poolat Parameswarath, Teng Joon Lim, Nalam Venkata Abhishek, Biplab Sikdar
Publikováno v:
GLOBECOM
Compromised relays in clustered IoT networks can be used to launch attacks that cannot be easily detected using the traditional security algorithms. In this paper, we consider an attack where a compromised relay deliberately drops the packets receive
Publikováno v:
ICCC
Mobile Edge Computing can be used to realize the low latency requirements of vehicular networks. However, by compromising the road side units (RSUs), an adversary can introduce an extra delay leading to various problems such as the wastage of edge co
Publikováno v:
2018 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR).
It is well known that clustering IoT devices will help to alleviate the network scalability problem in IoT networks. However, clustering also provides an opportunity for an adversary to compromise a set of nodes by simply compromising their gateway.