Security attacks in opportunistic mobile networks: A systematic literature review

A Altaweel, S Aslam, I Kamel - Journal of Network and Computer …, 2023 - Elsevier
Abstract Opportunistic Mobile Networks (OMNs), also known as Delay Tolerant Networks
(DTNs), refer to wireless networks in which the mobile nodes (eg, smartphones, tablets …

Simulative survey of flooding attacks in intermittently connected vehicular delay tolerant networks

W Khalid, N Ahmed, S Khan, Z Ullah, Y Javed - IEEE Access, 2023 - ieeexplore.ieee.org
Vehicular Adhoc Networks (VANETs) are an emerging and promising technology that
enables vehicles to communicate with roadside units (RSUs) and other vehicles. VANETs …

FAPMIC: Fake packet and selective packet drops attacks mitigation by Merkle hash tree in intermittently connected networks

W Khalid, N Ahmad, S Khan, NU Saquib… - IEEE …, 2023 - ieeexplore.ieee.org
Delay/Disruption Tolerant Networks (DTNs) are a special category of
IntermittentlyConnectedNetworks (ICNs). It has features such as long-delay, frequent …

Bayes factor of zero inflated models under jeffereys prior

P Pramanik, AK Maity - arXiv preprint arXiv:2401.03649, 2024 - arxiv.org
Microbiome omics data including 16S rRNA reveal intriguing dynamic associations between
the human microbiome and various disease states. Drastic changes in microbiota can be …

Exposed-mode of wormhole attack in opportunistic mobile networks: Impact study and analysis

S Aslam, A Altaweel, I Kamel - Proceedings of the 2023 European …, 2023 - dl.acm.org
Wormhole attack has exposed-mode (internal attack with exposed attacker nodes identities)
and hidden-mode (external attack with hidden attacker nodes identities). In exposed-mode …

Impact Study and Analysis of Hidden-mode of Wormhole Attack in Opportunistic Mobile Networks

S Aslam, A Altaweel, I Kamel - 2023 15th International …, 2023 - ieeexplore.ieee.org
The hidden-mode of wormhole attack is launched by malicious nodes that compromise
different locations in Opportunistic Mobile Networks (OMNs). These locations, which are …

[PDF][PDF] Simulative Survey of Flooding Attacks in Intermittently Connected Vehicular Delay Tolerant Networks

Z ULLAH - researchgate.net
ABSTRACT Vehicular Adhoc Networks (VANETs) are an emerging and promising
technology that enables vehicles to communicate with roadside units (RSUs) and other …

[PDF][PDF] VADIA-Verkle Tree-based Approach for Dealing Data Integrity Attacks in Opportunistic Mobile Social Networks

VRV Lakshmi, TG Kumar - jowua.com
Abstract Opportunistic Mobile Social Networks (OMSN) are prone to data integrity attacks
that jeopardize the integrity of the routing data inside the network. Among the several …

[PDF][PDF] FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks

M ARSHAD, D SHAHWAR - researchgate.net
ABSTRACT Delay/Disruption Tolerant Networks (DTNs) are a special category of
Intermittently-ConnectedNetworks (ICNs). It has features such as long-delay, frequent …