Intrusion detection in cyber–physical environment using hybrid Naïve Bayes—Decision table and multi-objective evolutionary feature selection

R Panigrahi, S Borah, M Pramanik, AK Bhoi… - Computer …, 2022 - Elsevier
Researchers are motivated to build effective Intrusion Detection Systems because of the
implications of malicious actions in computing, communication, and cyber–physical systems …

[HTML][HTML] A Trust-Based predictive model for mobile ad hoc network in internet of things

W Alnumay, U Ghosh, P Chatterjee - Sensors, 2019 - mdpi.com
The Internet of things (IoT) is a heterogeneous network of different types of wireless
networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks …

An integrated Z-number and dematel-based cooperation enforcement scheme for thwarting malicious nodes in MANETs

SM Udhaya Sankar, N Jagadish Kumar… - Wireless Personal …, 2023 - Springer
Abstract Mobile ad hoc Networks (MANETs) represent a group of mobile nodes that
constitutes the network deprived of any pre-established infrastructure. In MANETs, the …

Securing logistics system and supply chain using Blockchain

A Kumar, K Abhishek… - … Stochastic Models in …, 2021 - Wiley Online Library
Past international trade practices have been associated with opaque information flows that
have hindered traceability and created hurdles in hassle‐free trade. Blockchain and allied …

Security approaches in machine learning for satellite communication

M Rath, S Mishra - Machine learning and data mining in aerospace …, 2020 - Springer
The emerging technical approach Machine Learning (ML) is apprehensive with the design
and growth of algorithms and techniques that allocate computers to “learn”. The major focus …

Still wrong use of pairings in cryptography

O Uzunkol, MS Kiraz - Applied Mathematics and Computation, 2018 - Elsevier
Recently many pairing-based cryptographic protocols have been designed with a wide
variety of new novel applications including the ones in the emerging technologies like cloud …

A security framework for SDN-enabled smart power grids

U Ghosh, P Chatterjee, S Shetty - 2017 IEEE 37th International …, 2017 - ieeexplore.ieee.org
Emerging software defined networking (SDN) paradigm provides flexibility in controlling,
managing, and dynamically reconfiguring smart grid networks. It can be seen in the literature …

ISDSR+: improving the security and availability of secure routing protocol

H Kojima, N Yanai, JP Cruz - IEEE Access, 2019 - ieeexplore.ieee.org
In ad hoc networks that allow devices to dynamically configure networks via wireless
communication, a secure routing protocol is a technology that guarantees the validity of …

An SDN-IoT− based framework for future smart cities: addressing perspective

U Ghosh, P Chatterjee, S Shetty… - Internet of Things and …, 2020 - taylorfrancis.com
This chapter discusses a software-defined network-based framework for future smart cities.
In the proposed addressing scheme, a new Internet of Things (IoT) device will receive an …

Privacy enabled disjoint and dynamic address auto-configuration protocol for 6Lowpan

M Mavani, K Asawa - Ad Hoc Networks, 2018 - Elsevier
In unsecured 6LoWPANs, the nodes can be easily identified by their IPv6 as well as MAC
addresses. An adversary can snoop (and later, spoof) these addresses, thereby posing a …