Ad hoc networks are a new perspective of wireless communication for versatile hosts. Security is a colossal worry for ad hoc networks, especially for those security-touchy …
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …
In the Internet of Things (IoT), the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is susceptible to several disruptive attacks based on its functionalities and …
Wireless sensor networks (WSNs) are an emerging military and civilian technology that uses sensors. Sensor networks are hierarchical and chaotic in remote, unmonitored sites …
M Ponguwala, S Rao - IET Communications, 2019 - Wiley Online Library
Integration of mobile ad hoc networks (MANETs) and internet of things (IoT) becomes an emerging paradigm to enable opportunistic communication in IoT. However, the lack of …
G Arulselvan, A Rajaram - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
Maintaining a healthy environment requires constant vigilance. Keeping constant tabs on environmental factors might be a useful tool in the fight against and recovery from …
W Ding, W Zhai, L Liu, Y Gu… - Security and …, 2022 - Wiley Online Library
Internet of Things (IoT) is widely used in environmental monitoring, smart healthcare, and other fields. Due to its distributed nature, IoT is vulnerable to various internal attacks. One of …
The RPL routing protocol is susceptible to Selective Forwarding Attack (SFA), wherein malicious nodes selectively forward certain packets while discarding others and isolating a …
S Nithinsha, S Anusuya - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
The objective of the research work is to propose an intrusion detection system in a cloud environment using K-Means clustering-based outlier detection. In the open access and …