Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Sachin Lalar"'
Autor:
Praveen Kumar Kollu, Manoj L. Bangare, P. Venkata Hari Prasad, Pushpa M. Bangare, Kantilal Pitambar Rane, José Luis Arias-Gonzáles, Sachin Lalar, Mohammad Shabaz
Publikováno v:
SN Applied Sciences, Vol 5, Iss 10, Pp 1-9 (2023)
Abstract Food instability has been linked to infertility, health issues, accelerated aging, incorrect insulin regulation, and more. Innovative approaches increased food availability and quality. Agriculture environment monitoring systems need IoT and
Externí odkaz:
https://doaj.org/article/f712712a78c043a4ad9d3f2f1b139580
Publikováno v:
Wireless Communications and Mobile Computing. 2022:1-7
One of the main problems of networked control systems is that signal transmission delay is inevitable due to long distance transmission. This will affect the performance of the system, such as stability range, adjustment time, and rise time, and in s
Autor:
Liwa H. Al-Farhani, Yahya Alqahtani, Hamdan Ali Alshehri, R. John Martin, Sachin Lalar, Rituraj Jain
Publikováno v:
Security and Communication Networks.
The widespread use of the Internet of Things (IoT) technology has both good and bad things about it. There must be a full and reliable security system in place for the Internet of Things so that things can work together in a safe way and intrusions c
Autor:
Ismail Keshta, Yassine Aoudni, Mukta Sandhu, Abha Singh, Pardayev Abdunabi Xalikovich, Ali Rizwan, Mukesh Soni, Sachin Lalar
Publikováno v:
Physical Communication. 58:102048
Publikováno v:
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE).
Publikováno v:
Journal of Information and Optimization Sciences. 40:1003-1023
Wireless sensor network has widely used in various applications such as military, environment monitoring where sensor nodes has operated in open, harsh environment. Different type of attack...
Publikováno v:
Security and Communication Networks, Vol 2021 (2021)
Wireless sensor networks have been deployed in the open and unattended environment where the attacker can capture the sensors and create the replica of captured nodes. As the clone nodes have been considered legitimate nodes, clone nodes can initiate
Publikováno v:
SSRN Electronic Journal.
Wireless sensor network (WSN) is the collection of sensor nodes which are distributed in a specific environment. WSN is resource-controlled network which is vulnerable to physical attacks i.e. clone node attack. An attacker acquires information from
Autor:
Sachin Lalar, Arun Kumar Yadav
Publikováno v:
Oriental journal of computer science and technology. 10:174-179
Routing protocol is the essential and vital performance factor in the Mobile Ad-hoc Network. The routing protocols in MANET are accomplished to handle a lot number of nodes with restricted resources. There is a variety of routing protocol exist in MA
Publikováno v:
SSRN Electronic Journal.
Wireless sensor networks operate in harsh environment such as in surveillance zones and military area where nodes may be vulnerable to various kinds of attacks. Out of these attacks, one perilous attack is Clone node attack as it can fabricate differ