PB Singh, U Chugh, M Kathuria - Int. Res. J. Eng. Technol.(IRJET), 2019 - academia.edu
the vital and essential objective of intrusion detection is to supervise the network goods and valuables to uncover anomalous behavior and exploitation in the network. Intrusion …
M Badgujar, L Jat - Tech Scholar Deepak, and Lokendra Jat, 2022 - ijsret.com
WSNs are unstable because to the wireless nature of communication since any attacker with the desire to steal the data may do so by inserting rogue nodes into the network. Attackers …
MPS Chaitanya, BS Chowdary… - … Computing and Data …, 2023 - ieeexplore.ieee.org
Because of its inbuilt qualities and the media that they employ, wireless networks are susceptible to a wide variety of security breaches. In order for a node to transmit data, it must …
B Suryavanshi, EL Jat, EMG Jat - 2022 - ijsret.com
This essay offers a clear and comprehensive overview of the directions that our research on the topic of underwater sensor networks will go in the future. In this article, we explore the …
On the internet, malicious activities may take place, which can infect a single computer or bring down a whole network. It's possible that they are chosen at random. The number of …
A vehicular ad hoc network (VANETs) accelerates the availability of secure, interoperable remote communications for vehicles, transporters, activity signals, phones, and other …
MTSMP Vishwakarma, MM Jat - framework, 2022 - ijsret.com
In recent years, the area of wireless sensor networks has seen rapid advancements in technology and innovation. In this paper, a brief introduction of wireless sensors and their …
One of the main concerns in vehicular communications is the security of the Vehicular Ad- hoc Network (VANET), since each car must rely on messages sent by friends, some of which …