Security issues in Internet of Vehicles (IoV): A comprehensive survey

H Taslimasa, S Dadkhah, ECP Neto, P Xiong, S Ray… - Internet of Things, 2023 - Elsevier
Nowadays, connected vehicles have a major role in enhancing the driving experience.
Connected vehicles in the network share their knowledge with the help of the network …

[HTML][HTML] Optimized backoff scheme for prioritized data in wireless sensor networks: A class of service approach

IU Onwuegbuzie, S Abd Razak, I Fauzi Isnin… - PloS one, 2020 - journals.plos.org
Data prioritization of heterogeneous data in wireless sensor networks gives meaning to
mission-critical data that are time-sensitive as this may be a matter of life and death …

A cryptographic approach to prevent network incursion for enhancement of QoS in sustainable smart city using MANET

S Singh, A Pise, O Alfarraj, A Tolba, B Yoon - Sustainable Cities and …, 2022 - Elsevier
A city-wide communication network capable of supporting a range of applica-tions should be
established through the use of wireless sensor networks that collect, analyze, and act on …

[PDF][PDF] Two-dimensional projection-based wireless intrusion classification using lightweight efficientnet

ME Aminanto, IR Purbomukti… - … Materials & Continua, 2022 - pdfs.semanticscholar.org
Internet of Things (IoT) networks leverage wireless communication protocols, which
adversaries can exploit. Impersonation attacks, injection attacks, and flooding are several …

[PDF][PDF] iBADS: An improved Black-hole Attack Detection System using Trust based Weighted Method.

V Dani - Journal of Information Assurance & Security, 2022 - researchgate.net
In hostile environment, security is a key problem for confined communication between
mobile nodes. Adversaries can combine active and passive attacks against interceptable …

A modified AODV protocol for preventing blackhole attack in MANETs

Y Shashwat, P Pandey, KV Arya… - … Security Journal: A Global …, 2017 - Taylor & Francis
ABSTRACT Wireless Mobile Ad-Hoc Networks (MANETs) are infrastructure-less networks
commonly used for dynamic connection between nodes. These networks work without any …

Simulation of MANET's Single and Multiple Blackhole Attack with NS-3

O Sbai, M Elboukhari - 2018 IEEE 5th International Congress …, 2018 - ieeexplore.ieee.org
Mobile Ad-hoc Networks (MANETs) have gained popularity both in research and in
industrial fields. This is due to their ad hoc nature, easy deployment thanks to the lack of …

Performance analysis of ad-hoc on-demand distance vector (AODV) and dynamic source routing (DSR) under black hole attacks in mobile ad hoc network (MANET)

I Nurcahyani, H Hartadi - 2018 International Symposium on …, 2018 - ieeexplore.ieee.org
MANET consists of a collection of nodes which dynamically can be made anywhere without
using a fixed network infrastructure such as a base station so that MANET becomes …

Analysis of black-hole attack with its mitigation techniques in ad-hoc network

A Malik, S Gautam, N Khatoon, N Sharma… - … Learning Strategies for …, 2020 - igi-global.com
In wired and wireless communication, providing security is extremely important. It is a very
challenging issue. But the flying evolution in communication technology has triggered to …

Two-dimensional projection based wireless intrusion classification using lightweight EfficientNet

H Tekleselassie - Journal of Cyber Security and …, 2022 - journals.riverpublishers.com
Abstract Internet of Things (IoT) networks leverage wireless communication protocol, which
adversaries can exploit. Impersonation attacks, injection attacks, and flooding are several …