Impact of DoS attack in IoT system and identifying the attacker location for interference attacks

S Sinha - … 6th international conference on communication and …, 2021 - ieeexplore.ieee.org
Security in Internet of Things (IoT) is major concerned today. RPL is one of the protocols
used in network layer of IoT and vulnerable to different types of attack. DoS attack is one of …

Distributed Denial of Service Attack Detection and Prevention in Local Area Network

S Sinha, N Mahadev Prasad - Innovative Data Communication …, 2022 - Springer
DDOS attack detection has become more challenging due to the exponential growth of
network traffic and its diversity on the Internet. The main goal of this research work is to …

Network layer DoS Attack on IoT System and location identification of the attacker

S Sinha - 2021 Third International Conference on Inventive …, 2021 - ieeexplore.ieee.org
Internet of Things is the biggest and most accessible network where any smart device can
be connected, and security is a big concern these days. WSN is the prominent subpart of …

Predicting the e-learners learning style by using support vector regression technique

K Suresh, J Meghana, ME Pooja - … International Conference on …, 2021 - ieeexplore.ieee.org
Predicting student performance is a prominent key factor of Educational Data Mining,
Support Vector Regression are exposed to be useful factor for assessing under studies …

Rssi strength measurement in wireless sensor network with and without obstacles

S Anand, R Muralidharan, K Manoj, C Shreyas… - … Conference on Micro …, 2021 - Springer
In today's world, the influence of high-fidelity wireless sensor networks based on system on
a chip (SoC) architecture has produced a robust framework of networking possibilities …

EDITH-A robust framework for prevention of cyber attacks in the covid era

A Mukhopadhyay, A Prajwal - 2021 2nd International …, 2021 - ieeexplore.ieee.org
In the era of cloud technology, all the emails sent from one person to another needs to be
secure. Security attacks like email phishing, EBomb, DNS spoofing and so on have become …

Stack based location identification of malicious node in RPL attack using average power consumption

S Sinha, DP Deepika - 2021 2nd International Conference for …, 2021 - ieeexplore.ieee.org
-Security is the main concern in wireless sensor network. Attack can be occurred in different
ways in WSN depending upon the types of malicious activity through this research work we …

AI based obstacle Avoidance and Signal Management Autonomous Car with Less Collision

S Anand, S TA, A PG, KR RL… - 2022 IEEE North …, 2022 - ieeexplore.ieee.org
The proposed autonomous vehicle is designed and developed to operate on the road
without any driver. It is a self-driven remote vehicle to avoid obstacles and reduces accidents …

An Efficient Workflow Management Model for Fog Computing

S Charitha, S Manishankar - 2021 Third International …, 2021 - ieeexplore.ieee.org
With the emergence of the Internet of Things, there has been significant growth in the
number of smart compatible devices, necessitating the development of more effective data …

A Reliable Software Defifined Networking based Framework for IoT Devices

S Anand, N Manjunath - 2022 2nd International Conference on …, 2022 - ieeexplore.ieee.org
With the help of IoT (Internet of Things) devices, the world is becoming more connected. To
accomplish this, a vast amount of data must be safely stored and accessed, yet IoT devices …