[PDF][PDF] Internet of vehicles (IoV) requirements, attacks and countermeasures

A Samad, S Alam, S Mohammed… - Proceedings of 12th …, 2018 - academia.edu
Technology is moving towards more intelligent and more connected devices in this digital
world. Transport system is also not untouched with this phenomenon. Vehicles are …

A novel funnel and ontological mechanism for sustainable green human resource management (GHRM)

R Chand, S Nijjer, A Jandwani, GS Narula - International Journal of …, 2024 - Springer
Abstract Understanding Human Resource Management (HRM) and linking it with
sustainability is a cumbersome task. When management is linked with sustainability, it …

Named data networking: a survey on routing strategies

FA Karim, AHM Aman, R Hassan, K Nisar… - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet grows in popularity, data become an increasingly crucial component. People
now care more about the data than the data location. Named data network (NDN) takes this …

Blockchain technology in named data networks: A detailed survey

K Asaf, RA Rehman, BS Kim - Journal of Network and Computer …, 2020 - Elsevier
With massive new applications and online services, the future design of the Internet will
have new requirements and implications, such as compatible mobility, scalability, reliability …

Vssb-raft: a secure and efficient zero trust consensus algorithm for blockchain

S Tian, F Bai, T Shen, C Zhang, B Gong - ACM Transactions on Sensor …, 2024 - dl.acm.org
To solve the problems of vote forgery and malicious election of candidate nodes in the Raft
consensus algorithm, we combine zero trust with the Raft consensus algorithm and propose …

Modified dropping-random early detection (MD-RED): a modified algorithm for controlling network congestion

S Hassan, A Rufai - International Journal of Information Technology, 2023 - Springer
The quality of real-time network services is greatly dependent on the influential role of delay.
This problem of high end-to-end delay is due in part to the presence of a congested network …

PL-IDS: physical layer trust based intrusion detection system for wireless sensor networks

U Ghugar, J Pradhan, SK Bhoi, RR Sahoo… - International Journal of …, 2018 - Springer
In this paper, a physical layer trust based intrusion detection system (PL-IDS) is proposed to
calculate the trust for wireless sensor networks (WSNs) at the physical layer. The trust value …

FIHIM: a framework for information hiding in IPv6 using micro-protocols

P Bedi, A Dua, V Jindal - International Journal of Information Technology, 2023 - Springer
Abstract Information hiding in network traffic is generally done through network covert
channels (NCCs). As Internet Protocol version 6 (IPv6) is replacing Internet Protocol version …

CCJRF-ICN: A novel mechanism for coadjuvant caching joint request forwarding in information centric networks

K Delvadia, N Dutta, R Jadeja - IEEE Access, 2021 - ieeexplore.ieee.org
Information centric networking (ICN) shifts the focus of existing internet architecture from host-
oriented to content-oriented model by enabling in-network caching and content-based …

To improve scalability with Boolean matrix using efficient gossip failure detection and consensus algorithm for PeerSim simulator in IoT environment

S Kumar, JK Samriya, AS Yadav, M Kumar - International Journal of …, 2022 - Springer
Recent years have seen a rise in interest in peer-to-peer applications because of their
scalability, fault tolerance, and other noteworthy benefits. The main benefit of P2P …