A review of security and privacy concerns in the internet of things (IoT)

M Aqeel, F Ali, MW Iqbal, TA Rana, M Arif… - Journal of …, 2022 - Wiley Online Library
The recent two decades have witnessed tremendous growth in Internet of things (IoT)
applications. There are more than 50 billion devices connected globally. IoT applications' …

A survey of trust management in the internet of vehicles

SA Siddiqui, A Mahmood, QZ Sheng, H Suzuki, W Ni - Electronics, 2021 - mdpi.com
Over the past decade, the groundbreaking technological advancements in the Internet of
Vehicles (IoV) coupled with the notion of trust have attracted increasing attention from …

A review on c3i systems' security: Vulnerabilities, attacks, and countermeasures

H Ahmad, I Dharmadasa, F Ullah, MA Babar - ACM Computing Surveys, 2023 - dl.acm.org
Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in
critical civil and military domains for achieving information superiority, operational efficacy …

Privacy-breaching patterns in NoSQL databases

K Goel, AHM Ter Hofstede - IEEE Access, 2021 - ieeexplore.ieee.org
NoSQL databases disrupted the database market when first introduced. Their contemporary
relevance has increased further in the era of big data due to the demands placed on (real …

A secure addressing scheme for large-scale managed MANETs

U Ghosh, R Datta - IEEE transactions on network and service …, 2015 - ieeexplore.ieee.org
In this paper, we propose a low-overhead identity-based distributed dynamic address
configuration scheme for secure allocation of IP addresses to authorized nodes of a …

[PDF][PDF] Deep learning intrusion detection system for mobile ad hoc networks against flooding attacks

O Sbai, M Elboukhari - Int J Artif Intell ISSN, 2022 - academia.edu
Mobile ad hoc networks (MANETs) are infrastructure-less, dynamic wireless networks and
self-configuring, in which the nodes are resource constrained. With the exponential …

Performance analysis of Adhoc on-demand distance vector protocol under the influence of black-hole, gray-hole and worm-hole attacks in mobile adhoc network

AU Khan, MD Chawhan, MM Mushrif… - 2021 5th international …, 2021 - ieeexplore.ieee.org
Adhoc On-demand Distance Vector (AODV) is the well-known reactive routing protocol of
Mobile Adhoc Network (MANET). Absence of security mechanism in AODV disturbs the …

Wireless communication networks and swarm intelligence

AJ Al-Mousawi - Wireless Networks, 2021 - Springer
This paper is a comprehensive survey on the role of swarm intelligence in wireless
communication networks. The main aim of preparing this paper is to lead the way for the …

Distributed ledger technology (DLT) and Byzantine fault tolerance in blockchain

S Shrivastava, A Sharma - … and Applications: Proceedings of SoCTA 2021, 2022 - Springer
With the advent of technology, the world saw the rise of blockchain technology, because of
its accessibility, and efficiency in managing transactions and the related records. According …

Performance Analysis of Efficiently trusted AODV serving Security in MANET under Blackhole Attack Using Genetic Algorithm

I Nausheen, A Upadhyay - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
The mobile nodes or systems in mobile ad hoc networks wirelessly transmit binary data. The
topology of the network is dynamic. Therefore, because of the network's wireless nature …