Zobrazeno 1 - 10
of 307
pro vyhledávání: '"Teng Joon Lim"'
Autor:
Nalam Venkata Abhishek, Teng Joon Lim
Publikováno v:
Journal of Communications and Networks. 24:451-462
Publikováno v:
IEEE Internet of Things Journal. 9:3270-3281
The Internet of Vehicles (IoV) may enhance road safety, improve traffic flow, etc. However, internet connected intelligent vehicles (IVs) are vulnerable to cyber-attacks. One of the important challenges in IoV is thus, verifying data integrity with s
Publikováno v:
IEEE Transactions on Vehicular Technology. 70:12039-12054
In typical wireless heterogeneous networks (HetNets), users are clustered around known hotspots, e.g., shopping centers or schools, but such a non-uniform distribution of nodes is difficult to analyze. This paper explicitly models this scenario, with
Publikováno v:
IEEE Potentials. 40:7-12
Throughout history, the nature of professional engineering practice has constantly evolved, driven not only by evolution in technology and scientific knowledge but also by changes in the way in which our engineered solutions interact with society. As
Publikováno v:
ICC 2022 - IEEE International Conference on Communications.
Publikováno v:
Journal of Communications and Networks. 22:303-315
Next generation wireless networks are under high risk of security attacks due to increased connectivity and information sharing among peer nodes. Some of the nodes could potentially be malicious, intending to disrupt or tamper sensitive data transfer
Publikováno v:
IEEE Transactions on Information Forensics and Security. 15:435-446
Clustering Internet of Things (IoT) networks, to alleviate the network scalability problem, provides an opportunity for an adversary to compromise a set of nodes by simply compromising the relay they are associated with. In such scenarios, an adversa
Publikováno v:
IEEE Transactions on Information Forensics and Security. 15:2570-2583
Byzantine attack is a severe security concern in network coding enabled wireless ad hoc networks, because the malicious nodes can easily inject bogus packets into the information flow and cause an epidemic propagation of pollution. In this paper, we
Autor:
Hongyi Peng, Vinay Sachidananda, Teng Joon Lim, Rajendra Patil, Mingchang Liu, Sivaanandh Muneeswaran, Mohan Gurusamy
Publikováno v:
Information and Communications Security ISBN: 9783031157769
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9d10eb409845946b5532240206eae82e
https://doi.org/10.1007/978-3-031-15777-6_23
https://doi.org/10.1007/978-3-031-15777-6_23
Publikováno v:
2021 IEEE Global Communications Conference (GLOBECOM).