Zobrazeno 1 - 10
of 1 098
pro vyhledávání: '"Secure Routing"'
Publikováno v:
High-Confidence Computing, Vol 4, Iss 3, Pp 100194- (2024)
Mobile ad hoc networks (MANETs), which correspond to a novel wireless technology, are widely used in Internet of Things (IoT) systems such as drones, wireless sensor networks, and military or disaster relief communication. From the perspective of com
Externí odkaz:
https://doaj.org/article/98d46ff5afbe4e5fb74802f9483f7e25
Autor:
Venkatesh Prasad B.S, H.R. Roopashree
Publikováno v:
Measurement: Sensors, Vol 33, Iss , Pp 101132- (2024)
With the rapid growth of technology advancement in wireless communication have resulted in interconnection of large number of devices covering wide range of application services. Wireless sensor network (WSN) have become popular and provide various b
Externí odkaz:
https://doaj.org/article/512f22d1c4444b4faf47da457351f551
Publikováno v:
IEEE Access, Vol 12, Pp 3140-3175 (2024)
The software-defined wireless sensor network (SDWSN) has the potential to improve flexibility, scalability, and network performance, but security and quality of service (QoS) are major challenges due to attackers, poor network management, and ineffic
Externí odkaz:
https://doaj.org/article/c1d43c554d904447a2d5d5919f3af542
Publikováno v:
ICT Express, Vol 9, Iss 6, Pp 1077-1084 (2023)
Wireless sensor networks are susceptible to a variety of network attacks. Due to the limited energy of nodes and selfish nodes in the network, the packet delivery rate is lower. To address these issues, we innovatively propose an energy-harvesting Q-
Externí odkaz:
https://doaj.org/article/710f4c51289942f3bfe867cea77527f9
Publikováno v:
Measurement: Sensors, Vol 32, Iss , Pp 101057- (2024)
In this study, we discuss how Wireless Sensor Networks (WSN) are susceptible to malicious assaults from malfunctioning nodes, which jeopardise the security of data transmission in crucial applications. We use a Convolutional Neural Network coupled wi
Externí odkaz:
https://doaj.org/article/634f124086db40b4a236753ef46380fa
Publikováno v:
High-Confidence Computing, Vol 4, Iss 1, Pp 100170- (2024)
Nowadays, Flying Adhoc Networks play a vital role due to its high efficiency in fast communication. Unmanned aerial vehicles transmit data much faster than other networks and are useful in all aspects of communication. In healthcare applications, wir
Externí odkaz:
https://doaj.org/article/e493fccd547e43e2850da91bfed39714
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 9, Pp 101786- (2023)
With the rapid progress of sensor technology, underwater monitoring wireless sensor network (UMWSN) equipped with water resource monitoring capabilities have surfaced. UMWSN is currently emerging as a popular research and application area, with a wid
Externí odkaz:
https://doaj.org/article/7ad6af1c5d7a4ce29d8abbfdf6c8716f
Publikováno v:
Measurement: Sensors, Vol 29, Iss , Pp 100869- (2023)
MANET (Mobile ad-hoc networks) is typically a no-infrastructure multi-hop network where every node interacts with other network nodes either indirectly or directly via intermediate nodes. A lot of research is being undertaken to save the energy of mo
Externí odkaz:
https://doaj.org/article/01942711402a4455afc8ffd3e5344e16
Autor:
Xiaogang Yuan, Yipiao Chen
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 11, Iss 1, Pp 1-9 (2022)
Abstract Aiming at the characteristics of dynamic topology change and vulnerability of wireless mesh networks (WMN), a secure routing protocol based on dynamic reputation and load balance (SRP-DRLB) is proposed to improve the routing security and loa
Externí odkaz:
https://doaj.org/article/9d2ac16a6222458c81039da455e8566f
Autor:
Zdravko Karakehayov
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 2 (2023)
This paper deals with the tradeoffs between security, real-time and lifetime performance. Due to the multihop nature of communication wireless ad hoc networks are very vulnerable to attacks. Malicious nodes included in a routing path may misbehave an
Externí odkaz:
https://doaj.org/article/853bb466023d40cea2c92dd65576ba75