Detection and prevention from misbehaving intruders in vehicular networks

H Sedjelmaci, T Bouali… - 2014 IEEE Global …, 2014 - ieeexplore.ieee.org
In this paper, we design and implement a new intrusion detection and prevention schema for
vehicular networks. It has the ability to detect and predict with a high accuracy a future …

Vehicle authentication via monolithically certified public key and attributes

S Dolev, Ł Krzywiecki, N Panwar, M Segal - Wireless Networks, 2016 - Springer
Vehicular networks are used to coordinate actions among vehicles in traffic by the use of
wireless transceivers (pairs of transmitters and receivers). Unfortunately, the wireless …

Source localization using TDOA and FDOA measurements based on modified cuckoo search algorithm

M Abd El Aziz - Wireless Networks, 2017 - Springer
This paper introduces a new algorithm for solving the localization problem of moving
multiple disjoint sources using time difference of arrival and frequency difference of arrival …

Unknown network protocol classification method based on semi-supervised learning

R Lin, O Li, Q Li, Y Liu - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
Network protocol classification plays an important role in modern network security and fine-
grained management architectures. The state-of-the-art network protocol classification …

Self soft fault detection based routing protocol for vehicular ad hoc network in city environment

SK Bhoi, PM Khilar - Wireless Networks, 2016 - Springer
Routing protocols in vehicular ad hoc network (VANET) mainly depends on the correct
information provided by the neighbor vehicles in the form of beacons. If the on board unit is …

A competent three-tier fuzzy cluster algorithm for enhanced data transmission in cluster EAACK MANETs

J Sathiamoorthy, B Ramakrishnan - Soft Computing, 2018 - Springer
Security is a major issue that is being constantly addressed in infrastructure less networks.
An ad hoc network like MANET faces several issues that can jeopardize the transmissions in …

Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK MANETs

J Sathiamoorthy, B Ramakrishnan - Wireless Networks, 2017 - Springer
MANET is a set of mobile nodes which works in a dynamic changing network and it is
capable of communicating with each other efficiently where all the nodes perform a dual role …

Security analysis in satellite communication based on geostationary orbit

JK Pedersen, M Bøchman… - 2022 19th Annual …, 2022 - ieeexplore.ieee.org
With the rapid growth of Internet of Things (IoT) devices and evolving 5G/6G networks,
satellite communication has become extremely important, which can provide the capability …

Cost-effective encryption-based autonomous routing protocol for efficient and secure wireless sensor networks

K Saleem, A Derhab, MA Orgun, J Al-Muhtadi… - Sensors, 2016 - mdpi.com
The deployment of intelligent remote surveillance systems depends on wireless sensor
networks (WSNs) composed of various miniature resource-constrained wireless sensor …

AKER: An open-source security platform integrating IDS and SIEM functions with encrypted traffic analytic capability

A Esseghir, F Kamoun, O Hraiech - Journal of Cyber Security …, 2022 - Taylor & Francis
This research proposes Aker, an open-source security platform that integrates IDS and SIEM
functions while supporting the automated investigation of threats hidden in encrypted traffic …