The paper presents a new security aspect for a Mobile Ad-Hoc Network (MANET)-based IoT model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered …
B Kang, H Choo - International Journal of Sensor Networks, 2018 - inderscienceonline.com
A wireless sensor network (WSN)(or IoT network) is a collection of distributed nodes. These nodes gather data from various sensors and relay that information to a central point through …
L Liu, S Ogwu - Journal of Mobile Technology in Medicine, 2012 - journalmtm.com
Purpose: To examine scientific evidence on the effectiveness of mobile phone technology in Diabetes Mellitus (DM) care management. Methods: A systematic review was conducted …
K Lee - Multimedia Tools and Applications, 2012 - Springer
This paper suggests a backup path routing scheme in ad hoc networks for multimedia applications. A data path is established in an on-demand manner when there is a need to …
TR Smith, G Janée, J Frew, A Coleman - … of the 1st ACM/IEEE-CS joint …, 2001 - dl.acm.org
This note summarizes the system development activities of the Alexandr ia Digital Earth Prototype (ADEPT) Project. 5 ADEPT and the Alexandria Digital Library (ADL) are …
B Kang, C Park, H Choo - IEEE Sensors Journal, 2019 - ieeexplore.ieee.org
Recently, mobile sensor networks (MSN) have been actively studied due to the emergence of mobile sensors such as Robomote and robotic sensor agents (RSAs). The research on …
C Nishanthini, G Rajkumar… - 2013 International …, 2013 - ieeexplore.ieee.org
Nodes in Mobile Adhoc Network (MANET) are highly mobile. As a result, network topology and neighbouring nodes of each node vary abruptly which affects the communication …
The paper presents a new security aspect for a Mobile Ad-Hoc Network (MANET)-based IoT model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered …
To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has …