A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense

A Dahiya, BB Gupta - Future Generation Computer Systems, 2021 - Elsevier
DDoS attack is one of the most powerful cyber-weapons as it does not wait for a specific
server configuration or particular network state to attack or to disrupt any operation of the …

Energy efficient optimized rate based congestion control routing in wireless sensor network

V Srivastava, S Tripathi, K Singh, LH Son - Journal of Ambient Intelligence …, 2020 - Springer
A wireless sensor network is designed to facilitate various real time applications, constituting
a wide range of sensor nodes. In order to provide energy efficient transmissions, a novel …

Effects of governmental policies on energy-efficiency improvement of hydrogen fuel cell cars: A game-theoretic approach

H Jafari, S Safarzadeh, E Azad-Farsani - Energy, 2022 - Elsevier
In this research, an aspect of sustainable development is investigated by considering the
energy efficiency improvement of the hydrogen fuel cell cars on a supply chain including …

An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks

M Prasad, S Tripathi, K Dahal - Engineering Applications of Artificial …, 2023 - Elsevier
Abstract A Mobile Ad-Hoc Network (MANET) is a widely used temporary network. It is simple
to install and handle. However, its dynamic nature is more vulnerable to routing attacks than …

Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks

RS Krishnan, EG Julie, YH Robinson, R Kumar… - Wireless …, 2020 - Springer
Abstract Mobile Ad hoc Networks (MANETs) have gained great interests owing to their
dynamic and smoothness of exploitation. Conversely, the wireless and energetic nature …

Improved blowfish algorithm-based secure routing technique in IoT-based WSN

M Alotaibi - IEEE Access, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) has gained popularity with the growth and prospects of smart
networks. It is intended to exploit the network edges, which enables smart service and …

A temperature-aware trusted routing scheme for sensor networks: Security approach

T Khan, K Singh, M Manjul, MN Ahmad, AM Zain… - Computers & Electrical …, 2022 - Elsevier
This paper presents a hybrid trust model, and a multifactor, depending on trust value of
sensor nodes, remaining energy, and hop count, routing strategy known as Temperature …

A survey and taxonomy of resource allocation methods in wireless networks

H Liang, W Zhang - Journal of Communications and …, 2021 - ieeexplore.ieee.org
Resource allocation is a fundamental and vital issue for arbitrary wireless networks, which
can guarantee the network to run efficiently and stably. Especially, in the 5G and future 6G …

Machine learning based detection and a novel EC-BRTT algorithm based prevention of DoS attacks in wireless sensor networks

K Lakshmi Narayanan, R Santhana Krishnan… - Wireless Personal …, 2021 - Springer
Wireless sensor network allows nodes to communicate with another using wireless
channels so that it is necessary for packet delivery to the nodes. Black hole attack occurs …

TASRP: a trust aware secure routing protocol for wireless sensor networks

T Khan, K Singh - International Journal of Innovative …, 2021 - inderscienceonline.com
Trust-based security models are efficient and reliable over traditional cryptographic schemes
(eg, encryption, key management schemes) to detect and alleviate various internal threats …