[PDF][PDF] DEDA: An algorithm for early detection of topology attacks in the internet of things

J Karande, S Joshi - International Journal of Electrical and Computer …, 2021 - academia.edu
The internet of things (IoT) is used in domestic, industrial as well as mission-critical systems
including homes, transports, power plants, industrial manufacturing and health-care …

A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks

GM Borkar, AR Mahajan - International Journal of …, 2020 - inderscienceonline.com
Wireless communication formly mobile ad-hoc network (MANET) plays a significant role in
modern technology for transmitting the packets from source node to destination node. The …

PASER: Secure and efficient routing approach for airborne mesh networks

M Sbeiti, N Goddemeier, D Behnke… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Low-altitude unmanned aerial vehicles (UAVs) combined with WLAN mesh networks
(WMNs) have facilitated the emergence of airborne network-assisted applications. In …

Security approaches in machine learning for satellite communication

M Rath, S Mishra - Machine learning and data mining in aerospace …, 2020 - Springer
The emerging technical approach Machine Learning (ML) is apprehensive with the design
and growth of algorithms and techniques that allocate computers to “learn”. The major focus …

Advanced-level security in network and real-time applications using machine learning approaches

M Rath, S Mishra - … on Machine Learning Techniques, Methods, and …, 2022 - igi-global.com
Abstract Machine learning is a field that is developed out of artificial intelligence (AI).
Applying AI, we needed to manufacture better and keen machines. Be that as it may, aside …

Lightweight RFID authentication with forward and backward security

M Burmester, J Munilla - ACM Transactions on Information and System …, 2011 - dl.acm.org
We propose a lightweight RFID authentication protocol that supports forward and backward
security. The only cryptographic mechanism that this protocol uses is a pseudorandom …

TOHIP: A topology-hiding multipath routing protocol in mobile ad hoc networks

Y Zhang, T Yan, J Tian, Q Hu, G Wang, Z Li - Ad hoc networks, 2014 - Elsevier
Existing multipath routing protocols in MANETs ignore the topology-exposure problem. This
paper analyzes the threats of topology-exposure and propose a TOpology-HIding multipath …

TCP/IP layerwise taxonomy of attacks and defence mechanisms in mobile Ad Hoc networks

AA Mahamune, MM Chandane - Journal of The Institution of Engineers …, 2022 - Springer
Abstract Mobile Ad hoc NETwork (MANET) is a distributed architecture-less network having
mobile nodes dynamically building up routes among themselves for transmission of packets …

Prevention of wormhole attack using identity based signature scheme in MANET

D Sharma, V Kumar, R Kumar - … Intelligence in Data Mining—Volume 2 …, 2016 - Springer
Mobile ad hoc network (MANET) has attracted many security attacks due to its
characteristics of dynamic topology, limited resources and decentralize monitoring. One of …

Analysing routing protocols: four nodes topologies are sufficient

V Cortier, J Degrieck, S Delaune - … on Principles of Security and Trust, 2012 - Springer
Routing protocols aim at establishing a route between nodes on a network. Secured
versions of routing protocols have been proposed in order to provide more guarantees on …