Hybrid routing and load balancing protocol for wireless sensor network

U Palani, V Alamelumangai, A Nachiappan - Wireless Networks, 2016 - Springer
In wireless sensor network, when the nodes are mobile, the network structure keeps on
changing dynamically, that is, new nodes enter the network and old members exit the …

Analysis and validation of active eavesdropping attacks in passive FHSS RFID systems

F Huo, P Mitran, G Gong - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
In this paper, we present a generalized framework for active eavesdropping in a frequency
hopping spread spectrum passive radio frequency identification system. In our model, there …

Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain

D Kang, J Jung, J Mun, D Lee, Y Choi… - Security and …, 2016 - Wiley Online Library
Because of the evolution of mobile devices and networks, users can now access a network
at any moment, in whatever place with a smart card. User authentication using smart card is …

Defense against Sybil attacks and authentication for anonymous location-based routing in MANET

S Vadhana Kumari, B Paramasivan - Wireless Networks, 2017 - Springer
In MANET, providing authentication and security to location-based routing is a big task. To
overcome this problem, in this paper, we proposed a defense against Sybil attacks and …

RVCloud: a routing protocol for vehicular ad hoc network in city environment using cloud computing

SK Bhoi, PM Khilar - Wireless Networks, 2016 - Springer
Abstract Routing in Vehicular Ad hoc Network (VANET) is a challenging task due to high
mobility of vehicles. In this paper, a RVCloud routing protocol is proposed for VANET to send …

Toward identifying malicious encrypted traffic with a causality detection system

ZR Zeng, P Xun, W Peng, BK Zhao - Journal of Information Security and …, 2024 - Elsevier
The main methods for protecting user privacy and addressing cybersecurity problems
caused by encrypted traffic are non-decryption detection approaches. However, these …

kBF: Towards approximate and bloom filter based key-value storage for cloud computing systems

S Xiong, Y Yao, S Li, Q Cao, T He, H Qi… - … on Cloud Computing, 2014 - ieeexplore.ieee.org
As one of the most popular cloud services, data storage has attracted great attention in
recent research efforts. Key-value (kv) stores have emerged as a popular option for storing …

Enhancing challenge-based collaborative intrusion detection against insider attacks using spatial correlation

W Li, W Meng, J Parra-Arnau… - 2021 IEEE Conference …, 2021 - ieeexplore.ieee.org
With cyber-attacks becoming more complicated and the networks increasingly
interconnected, there has been a move towards using collaborative intrusion detection …

[PDF][PDF] Tag based client side detection of content sniffing attacks with file encryption and file splitter technique

SIA Qadri, K Pandey - International Journal of Advanced Computer …, 2012 - Citeseer
In this paper we provide a security framework for server and client side. In this we provide
some prevention methods which will apply for the server side and alert replication is also on …

[PDF][PDF] A literature reviewon sniffing attacks in computernetwork

A Kulshrestha, SK Dubey - International Journal of Advanced …, 2014 - academia.edu
In today's modern era, the internet plays very important role among communications of
various stakeholders. Internet creates a link between client and server. But the interface …