… Among these hole attacks, the sinkhole attack is the malignant one. A … provide mathematical analysis of our scheme for the traffic model. In Section 5, through the security analysis, we …
… In this paper the Authors analyse a small area located in the Quinis village (Friuli Venezia Giulia Region, NE Italy), applying and integrating multiple techniques to define the causes and …
… Second, we present the novel design and evaluation of two … together with a detailed analysis of the cryptographic overhead (… This paper focuses particularly on sink-hole and selective …
BH Nam, YJ Kim, H Youn - Engineering Geology, 2020 - Elsevier
… used as input variables to design a probabilistic sinkhole-prediction model at a regional scale. The correlation analysis between the factors and sinkhole formation is essential prior to …
… Thus, A can extract the stored sensitive information by applying power analysis attacks [12,13]. A can also install malicious sinkhole attack by launching script in the IoT devices which …
… This study proposes a design for BC gateway that aimed to adapt and secure them against the … Design and analysis of probing route to defense sink-hole attacks for internet of things …
F Gutiérrez - Oxford research encyclopedia of natural hazard …, 2016 - oxfordre.com
… assessment and the design of efficient mitigation measures. … The holes in the sinkhole walls are ancient man-made caves. … The analysis of the sinkhole hazard also requires as much …
… , though the sinkhole failures are … analysis. Numerical results are compared with the two-dimensional axisymmetric results, and design charts presented to cover a wide range of design …
R Baskar, K Raja, C Joseph, M Reji - Indian Journal of Science and …, 2017 - academia.edu
… is the major constraint while designing protocols and hardware, as … Attacks in sensor network, and the analysis of the attack … In black hole attack the attacker drops or swallows all the …