M Bin-Yahya, X Shen - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Network topology obfuscation (NTO) is generally considered as a promising proactive mechanism to mitigate traffic analysis attacks. The main challenge is to strike a balance …
M Bin–Yahya, XS Shen - 2021 IEEE Global Communications …, 2021 - ieeexplore.ieee.org
In WSNs, packets are delivered through mostly static shortest paths to their destination. However, static packet delivery makes WSNs highly vulnerable to traffic analysis attacks due …
CM Moreira, G Kaddoum - 2023 International Wireless …, 2023 - ieeexplore.ieee.org
The resource-constrained IPV6-based low power and lossy network (6LowPAN) is connected through the routing protocol for low power and lossy networks (RPL). This …
Wireless Sensor Network (WSN) using Software Defined Networking (SDN) can achieve several advantages such as flexible and centralized network management and efficient …
The fifth generation (5G) of wireless networks are very complex infrastructures due to their new services and the augmentation of the density of connected devices. The 3rd Generation …