A survey on secure multipath routing protocols in WSNs

E Stavrou, A Pitsillides - Computer Networks, 2010 - Elsevier
Routing protocols in wireless sensor networks (WSN) have been substantially investigated
by researches. Most state-of-the-art surveys have focused on reviewing the different routing …

Sdn-based vanets, security attacks, applications, and challenges

M Arif, G Wang, O Geman, VE Balas, P Tao… - Applied Sciences, 2020 - mdpi.com
Vehicular ad-hoc networks (VANETs) are the specific sort of ad-hoc networks that are
utilized in intelligent transportation systems (ITS). VANETs have become one of the most …

[PDF][PDF] 物联网安全特征与关键技术

杨庚, 许建, 陈伟, 祁正华, 王海勇 - 2010 - cf.lcchina.org.cn
物联网的安全与隐私保护问题直接关系到物联网服务能否得到真正的实际推广应用,
从信息安全的机密性, 完整性和可用性等三个基本属性出发, 分析了物联网安全的特征和面临的 …

A survey on software-defined VANETs: benefits, challenges, and future directions

WB Jaballah, M Conti, C Lal - arXiv preprint arXiv:1904.04577, 2019 - arxiv.org
The evolving of Fifth Generation (5G) networks isbecoming more readily available as a
major driver of the growthof new applications and business models. Vehicular Ad …

Security and design requirements for software-defined VANETs

WB Jaballah, M Conti, C Lal - Computer Networks, 2020 - Elsevier
Abstract The evolving of Fifth Generation (5G) networks is becoming more readily available
as a significant driver of the growth of new applications and business models. Vehicular Ad …

Security of SDN-based vehicular ad hoc networks: State-of-the-art and challenges

R Sultana, J Grover, M Tripathi - Vehicular Communications, 2021 - Elsevier
Abstract Development of Software Defined Networking (SDN) based Vehicular Ad Hoc
Networks (VANETs) is one of the key enablers of 5G technology. VANETs enable different …

Location verification and trust management for resilient geographic routing

K Liu, N Abu-Ghazaleh, KD Kang - Journal of parallel and distributed …, 2007 - Elsevier
In this paper, we consider the security of geographic routing (GR) protocols. In GR,
neighbors exchange their location information. Based on this information, a node forwards …

Selective forwarding attack detection using watermark in WSNs

H Deng, X Sun, B Wang, Y Cao - 2009 ISECS International …, 2009 - ieeexplore.ieee.org
With the widely use of wireless sensor network (WSN), data forwarding security has become
more and more important to the whole network. In order to avoid the selective forwarding …

A trust-based geographical routing scheme in sensor networks

KS Hung, KS Lui, YK Kwok - 2007 IEEE Wireless …, 2007 - ieeexplore.ieee.org
Devices in a sensor network need to work in a hostile environment and they are usually
powered by batteries. Yet the whole purpose of deploying a sensor network is to perform …

Efficient multi-hop broadcasting in dense nanonetworks

T Arrabal, D Dhoutaut, E Dedu - 2018 IEEE 17th International …, 2018 - ieeexplore.ieee.org
Broadcasting is a widely used dissemination technique in wireless multi-hop networks. The
simplest broadcasting technique, the pure flooding, is quite inefficient in terms of number of …