The Internet of things (IoT) has revolutionized the use of connectivity and has given birth to new transmission technologies to satisfy the requirements of diverse IoT applications. Low …
VV Vegesna - International Journal of Management, Technology …, 2023 - papers.ssrn.com
Complexity of systems are increasing day by day. This leads to more and more vulnerabilities in Systems. Attackers use these vulnerabilities to exploit the victim's system. It …
T Wang, X Wei, J Fan, T Liang - Computer Networks, 2018 - Elsevier
The shared nature of wireless communication, the open access to wireless medium, the tightly coupled design principle of wireless network protocol and the scarcity of radio …
The Internet of Vehicles (IoV) paradigm aims to improve road safety and provide a comfortable driving experience for Internet-connected vehicles, by transmitting early warning …
J Fan, T Liang, T Wang, J Liu - The Computer Journal, 2019 - academic.oup.com
Wireless sensor network can be easily attacked by jammers for its shared character and open access to the wireless channel. Jamming attack could produce a significant threat to …
S Muthu Mariappan, S Selvakumar - Wireless Personal Communications, 2021 - Springer
Nowadays mobile/cellular phones are considered as the most common and the key medium for establishing communication amid the sensor nodes in Wireless Sensor Network (WSN) …
A Ajinu, CP Maheswaran - Wireless Networks, 2022 - Springer
In the modern world, it is necessary to monitor a user's mobility in everyday life to provide advanced mobile services. Mostly, the location-based services (LBS) depend on both the …
X Wei, T Wang - Applied Soft Computing, 2021 - Elsevier
Jamming attacks, which exploit the shared and openness nature of the wireless mediums, are one of the major threats to wireless networks since they may significantly degrade the …
T Wang, X Wei, J Fan, T Liang - Security and Communication …, 2018 - hindawi.com
Multihop Wireless Networks (MHWNs) can be easily attacked by the jammer for their shared nature and open access to the wireless medium. The jamming attack may prevent the …