Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions

W Li, W Meng, LF Kwok - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …

A survey on human-centric communications in non-cooperative wireless relay networks

B Jedari, F Xia, Z Ning - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
The performance of data delivery in wireless relay networks (WRNs), such as delay-tolerant
networks and device-to-device communications heavily relies on the cooperation of mobile …

Mesh segmentation-a comparative study

M Attene, S Katz, M Mortara, G Patané… - … on Shape Modeling …, 2006 - ieeexplore.ieee.org
Mesh segmentation has become an important component in many applications in computer
graphics. In the last several years, many algorithms have been proposed in this growing …

Security attacks in opportunistic mobile networks: A systematic literature review

A Altaweel, S Aslam, I Kamel - Journal of Network and Computer …, 2023 - Elsevier
Abstract Opportunistic Mobile Networks (OMNs), also known as Delay Tolerant Networks
(DTNs), refer to wireless networks in which the mobile nodes (eg, smartphones, tablets …

A middleware for opportunistic content distribution

Ó Helgason, ST Kouyoumdjieva, L Pajević, EA Yavuz… - Computer Networks, 2016 - Elsevier
In this work we present a middleware architecture for a mobile peer-to-peer content
distribution system. Our architecture allows wireless content dissemination between mobile …

Mitigating the ack counterfeiting attack in delay and disruption tolerant networks

JF Naves, IM Moraes - 2017 IEEE Symposium on Computers …, 2017 - ieeexplore.ieee.org
Routing protocols for Delay and Disruption Tolerant Networks (DTNs) are prone to suffer
from malicious behavior of nodes. Particularly, in the acknowledgment counterfeiting attack …

A trust structure for detection of sybil attacks in opportunistic networks

S Rashidibajgan - 2016 11th International Conference for …, 2016 - ieeexplore.ieee.org
Opportunistic networks (OppNet) enable users to connect each other via wireless
communication without connecting to the Internet. These networks have fragile structures …

Analytical Optimal Solution of Selfish Node Detection with 2-hop Constraints in OppNets

Y Gao, J Tao, Z Wang, W Li… - 2021 IEEE 18th …, 2021 - ieeexplore.ieee.org
Selfish node detection offers an effective means to mitigate the routing performance
degradation caused by selfish behaviors in opportunistic Networks (OppNets), but leads to …

Contextual dishonest behaviour detection for cognitive adaptive charging in dynamic smart micro-grids

M Radenkovic, A Walker - 2019 15th Annual Conference on …, 2019 - ieeexplore.ieee.org
The emerging Smart Grid (SG) paradigm promises to address decreasing grid stability from
thinning safe operating margins, meet continually rising demand from pervasive high …

Security Mechanisms over Delay Tolerant Infrastructures

B Gonzales - 2020 - openrepository.aut.ac.nz
The motivation of this research is to seek a flexible encryption and authentication method to
facilitate the secure delivery of data through a Delay-Tolerant Network Infrastructure. This …