The state of ai-empowered backscatter communications: A comprehensive survey

F Xu, T Hussain, M Ahmed, K Ali… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is undergoing significant advancements, driven by the
emergence of backscatter communication (BC) and artificial intelligence (AI). BC is an …

Machine Learning for Computer and Cyber Security

BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …

Black hole attack detection using K‐nearest neighbor algorithm and reputation calculation in mobile ad hoc networks

G Farahani - Security and communication Networks, 2021 - Wiley Online Library
The characteristics of the mobile ad hoc network (MANET), such as no need for
infrastructure, high speed in setting up the network, and no need for centralized …

Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles

Z Hassan, A Mehmood, C Maple, MA Khan… - IEEE …, 2020 - ieeexplore.ieee.org
Detection of Black Hole attacks is one of the most challenging and critical routing security
issues in vehicular ad hoc networks (VANETs) and autonomous and connected vehicles …

The state of ai-empowered backscatter communications: A comprehensive survey

M Ahmed, T Hussain, K Ali, MA Mirza, WU Khan… - Authorea …, 2023 - techrxiv.org
This paper brings these two technologies together to investigate the current state of AI-
powered BC. We begin with an introduction to BC and an overview of the AI algorithms …

BTEM: Belief based trust evaluation mechanism for wireless sensor networks

RW Anwar, A Zainal, F Outay, A Yasar… - Future generation …, 2019 - Elsevier
With the emergence of WSNs in the recent times, providing trustworthy and reliable data
delivery is challenging task due to unique characteristics and constraints of nodes. Malicious …

MAC-AODV based mutual authentication scheme for constraint oriented networks

M Adil, R Khan, MA Almaiah, M Al-Zahrani… - IEEE …, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) is an infrastructure free organization of various
operational devices. Due to their overwhelming characteristics, these networks are used in …

Robust and secure data transmission using artificial intelligence techniques in ad-hoc networks

P Rani, Kavita, S Verma, N Kaur, M Wozniak, J Shafi… - Sensors, 2021 - mdpi.com
The paper presents a new security aspect for a Mobile Ad-Hoc Network (MANET)-based IoT
model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered …

Mutual authentication scheme for the device-to-server communication in the Internet of medical things

J Sun, F Khan, J Li, MD Alshehri… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Medical Things (IoMT) is an application-specific extension of the generalized
Internet of Things (IoT) to ensure reliable communication among devices, designed for the …

Mitigation of black hole attacks using firefly and artificial neural network

P Rani, Kavita, S Verma, DB Rawat, S Dash - Neural Computing and …, 2022 - Springer
Abstract In Mobile Ad hoc Network (MANET), network topology changes as
devices/users/nodes move and nodes can serve as a source, destination, or router for the …