Secure routing for internet of things: A survey

D Airehrour, J Gutierrez, SK Ray - Journal of Network and Computer …, 2016 - Elsevier
Abstract The Internet of Things (IoT) could be described as the pervasive and global network
which aids and provides a system for the monitoring and control of the physical world …

A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing

SA Soleymani, AH Abdullah, M Zareei, MH Anisi… - IEEE …, 2017 - ieeexplore.ieee.org
In vehicular ad hoc networks (VANETs), trust establishment among vehicles is important to
secure integrity and reliability of applications. In general, trust and reliability help vehicles to …

Implementation of Hidden Node Detection Scheme for Self‐Organization of Data Packet

P Ganesh, G Naidu, K Swaroopa… - Wireless …, 2022 - Wiley Online Library
The mobile nodes are infrequent movement in nature; therefore, its packet transmission is
also infrequent. Packet overload occurred for routing process, and data are lossed by …

Robust defense scheme against selective drop attack in wireless ad hoc networks

T Poongodi, MS Khan, R Patan, AH Gandomi… - IEEE …, 2019 - ieeexplore.ieee.org
Performance and security are two critical functions of wireless ad-hoc networks (WANETs).
Network security ensures the integrity, availability, and performance of WANETs. It helps to …

A model of data forwarding in MANETs for lightweight detection of malicious packet dropping

L Sánchez-Casado, G Maciá-Fernández… - Computer Networks, 2015 - Elsevier
This work introduces a model of data forwarding in MANETs which is used for recognizing
malicious packet dropping behaviors. First, different legitimate packet discard situations are …

Router and gateway node placement in wireless mesh networks for emergency rescue scenarios

M Wzorek, C Berger, P Doherty - Autonomous Intelligent Systems, 2021 - Springer
The focus of this paper is on base functionalities required for UAV-based rapid deployment
of an ad hoc communication infrastructure in the initial phases of rescue operations. The …

An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET

SA Soleymani, MH Anisi, AH Abdullah… - Science China …, 2020 - Springer
The exchange of correct and reliable data among legitimate nodes is one of the most
important challenges in vehicular ad hoc networks (VANETs). Malicious nodes and …

Identification of contamination zones for sinkhole detection in MANETs

L Sánchez-Casado, G Macia-Fernandez… - Journal of Network and …, 2015 - Elsevier
This paper presents a novel approach intended to detect the well-known sinkhole attack in
MANETs, one of the most representative route poisoning attacks aimed at exploiting multi …

Comparative and QoS performance analysis of terrestrial-aerial platforms-satellites systems for temporary events

FA Almalki - International Journal of Computer Networks & …, 2019 - papers.ssrn.com
Wireless communications, nowadays, becomes a vital element of people's daily life.
Providing global connectivity in future communication systems via the heterogeneous …

Lightweight dynamic group rekeying for low-power wireless networks in IIoT

E Uchiteleva, AR Hussein… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In this article, a novel pseudorandom key chaining (PRKC) algorithm is introduced and
evaluated. This lightweight symmetric scheme enables a transmission-triggered time …