Review on Developments and Progress in Nickelate‐Based Heterostructure Composites and Superconducting Thin Films

X Yang, M Li, Z Ding, L Li, C Ji… - Advanced Quantum …, 2023 - Wiley Online Library
In the past decade, the rapid development of modern heterointerface growth and
characterization techniques has stimulated great effort to research and design the …

[HTML][HTML] A trust-based model for secure routing against RPL attacks in internet of things

SM Muzammal, RK Murugesan, NZ Jhanjhi… - Sensors, 2022 - mdpi.com
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …

Identify selective forwarding attacks using danger model: Promote the detection accuracy in wireless sensor networks

X Huang, Y Wu - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are prone to attack due to open work conditions and
broadcast communication. The selective forwarding attack, one of the inner attacks in WSNs …

Trust based iot routing attacks detection using recurrent neural networks

K Ahmadi, R Javidan - … Conference on Smart Cities, Internet of …, 2022 - ieeexplore.ieee.org
Along with the recent growth of IOT applications, related security issues have also received
a great attention. Various IOT vulnerabilities have been investigated so far, among which …

Trustworthy retrieval system in mobile P2P wireless network

YT Chuang, JZ Jhang - Ad Hoc Networks, 2024 - Elsevier
Modern lifestyles heavily rely on the Internet, with mobile devices and wireless networks
being indispensable. However, in peer-to-peer (P2P) wireless networks, low battery levels …

A novel RPL defense mechanism based on trust and deep learning for internet of things

K Ahmadi, R Javidan - The Journal of Supercomputing, 2024 - Springer
Along with the significant growth of applications and facilities provided by the Internet of
Things (IoT) in recent years, security challenges and related issues to privacy become …

DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN

VR Rajasekar, S Rajkumar - Cluster Computing, 2024 - Springer
The RPL routing protocol is susceptible to Selective Forwarding Attack (SFA), wherein
malicious nodes selectively forward certain packets while discarding others and isolating a …

An Overview of Iot Architecture Security Issues and Countermeasures

W Khalaifat - Asian Journal of Research in Computer …, 2024 - science.manuscript2send.com
The Internet of Things (IoT) has revolutionized the way we interact with our surroundings. As
the number of IoT devices continues to increase, along with limited resources and diverse …

Metric-Oriented Comparison of Selective Forwarding Attack Detection Techniques in IoT-Based Systems

N Sinha, A Kumar Mishra - Advances in Distributed Computing and …, 2023 - Springer
Abstract The Internet of Things (IoT) is an innovative technology nowadays due to its broad
variety of applications in industrial and consumer markets. Secure and timely packet …

Enhancing Energy Efficiency in Intrusion Detection Systems for Wireless Sensor Networks Through Zigbee Protocol

M Keerthika, D Shanmugapriya… - Risk Assessment and …, 2024 - igi-global.com
Wireless sensor networks (WSNs) are important in various applications, including
environmental monitoring, healthcare, and industrial automation. However, the energy …