Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things

A Hasan, MA Khan, B Shabir, A Munir, AW Malik… - Applied Sciences, 2022 - mdpi.com
The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to
their resource-constrained nature. Extensive research efforts have been dedicated to …

[PDF][PDF] Mobile ad hoc networks intrusion detection system against packet dropping attacks

O Sbai, M Elboukhari - Indonesian Journal of Electrical Engineering …, 2022 - academia.edu
Due to the extreme lack of a stable infrastructure, also self-organization of network
components, unpredictable network topologies, and the lack of a central authority for routing …

Comparative study between network layer attacks in mobile ad hoc networks

O Sbai, M Elboukhari - … , Intelligent Systems and Security: Proceedings of …, 2022 - Springer
Amid the most recent decade, a few research endeavors have explored developing Internet
of Things (IoT) and Mobile Ad hoc Networks (MANETs) application situations in a new …

A simulation analyses of MANET's attacks against OLSR protocol with ns-3

O Sbai, M Elboukhari - Innovations in Smart Cities Applications Edition 3 …, 2020 - Springer
During the last decade, the Internet of Things (IoT) became an emerging technology, it is
exploring in every area of human life. The IoT provide facilities to identify and communicate …

Performance analysis of AODV, OLSR, DSDV routing protocols in MANET under black hole attack

MNB Anwar - Proceedings of the international conference on …, 2020 - dl.acm.org
Presently Mobile ad hoc network (MANET) is going more exoteric for its wireless structure,
and its demand is increasing day by day. MANET is basically used in such type of …

Modeling the Performance of IEEE 802.11 ac WLAN Network for Remote Visual SLAM

M Mamchenko - … of large-scale system development (MLSD), 2023 - ieeexplore.ieee.org
The paper presents the results of analyzing existing approaches and models to estimate
bandwidth and delays in the wireless channel, as well as energy consumption and …

МОДЕЛИРОВАНИЕ РАБОТЫ СЕТИ IEEE 802.11 AC ДЛЯ АЛГОРИТМОВ ВИЗУАЛЬНОГО SLAM C УДАЛЕННОЙ ОБРАБОТКОЙ ДАННЫХ

МВ Мамченко - Москва, 2023 - elibrary.ru
В работе представлены результаты оценки пропускной способности канала, среднего
значения задержки, коэффициента доставки пакетов и энергетических затрат при …

[HTML][HTML] ОбЕСПЕЧЕНИЕ бЕзОПАСНОЙ МАРШРУТИзАЦИИ В бЕСПРОВОдНЫХ САМООРГАНИзУющИХСя СЕТяХ

М Волков, ЭН Гордеев - Вопросы кибербезопасности, 2022 - cyberleninka.ru
Цель статьи: разработка алгоритма распределенной маршрутизации для обеспечения
безопасности в беспроводных самоорганизующихся сетях в условиях атак …

A simulation analysis of MANET's link-spoofing and replay attacks with ns-3

O Sbai, M Elboukhari - Proceedings of the 4th International Conference …, 2019 - dl.acm.org
Mobile Ad hoc Networks (MANETs) are one of the next generation of computing, will play a
very important role in the Internet of Things (IoT), for example in smart environments, IoT …

[PDF][PDF] МОДЕЛИРОВАНИЕ РАБОТЫ СЕТИ IEEE 802.11 AC ДЛЯ АЛГОРИТМОВ ВИЗУАЛЬНОГО SLAM C УДАЛЕННОЙ ОБРАБОТКОЙ ДАННЫХ1

МВ Мамченко - Управление развитием крупномасштабных систем … - mlsd2023.ipu.ru
В работе представлены результаты оценки пропускной способности канала, среднего
значения задержки, коэффициента доставки пакетов и энергетических затрат при …