Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks

GK Chella Thevar, G Rohini - Wireless Networks, 2017 - Springer
In wireless sensor networks, a sensor node communicates with a small set of neighbour
sensor nodes and with the base station through a group leader or a cluster head. However …

Towards comparative evaluation of trust and reputation models over static, dynamic and oscillating wireless sensor networks

VK Verma, S Singh, NP Pathak - Wireless Networks, 2017 - Springer
Trust and reputation models emerges new facet that aims to provide secure and reliable
computations in distributed computational environment. In this manuscript, we propose …

A comparative performance analysis on network traffic classification using supervised learning algorithms

R Archanaa, V Athulya, T Rajasundari… - 2017 4th International …, 2017 - ieeexplore.ieee.org
Network traffic classification has become vital due to the increased flow of web traffic from
services like HTTP, FTP, and SMTP etc. The idea of Network traffic classification is to …

Robust network traffic identification with unknown applications

J Zhang, C Chen, Y Xiang, W Zhou - … of the 8th ACM SIGSAC symposium …, 2013 - dl.acm.org
Traffic classification is a fundamental component in advanced network management and
security. Recent research has achieved certain success in the application of machine …

Pair-wise key agreement and hop-by-hop authentication protocol for MANET

K Shanthi, D Murugan - Wireless Networks, 2017 - Springer
In MANET, the most important issues are authentication of data packet in the network. Due to
the hostile environment, security is major concern while data transmission. In order to …

Group key authentication scheme for vanet intrusion detection (GKAVIN)

G Kumaresan, T Adiline Macriga - Wireless Networks, 2017 - Springer
Security must be provided in VANET as it is open to various attacks due to malicious vehicle,
Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The …

Information-centric dissemination protocol for safety information in vehicular ad-hoc networks

NT Dinh, Y Kim - Wireless Networks, 2017 - Springer
In vehicular networks, efficient safety information dissemination is a crucial issue. Unique
characteristics of such an environment like highly mobility, fast topology changing, short …

EPTR: expected path throughput based routing protocol for wireless mesh network

X Deng, L He, Q Liu, X Li, L Cai, Z Chen - Wireless Networks, 2016 - Springer
For effective routing in wireless mesh networks, we proposed a routing metric, expected path
throughput (EPT), and a routing protocol, expected path throughput routing protocol (EPTR) …

Optimal coding and allocation for perfect secrecy in multiple clouds

P Hu, CW Sung, SW Ho… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
For a user to store data in the cloud, using services provided by multiple cloud storage
providers (CSPs) is a promising approach to increase the level of data availability and …

Designing energy-aware collaborative intrusion detection in IoT networks

W Li, P Rosenberg, M Glisby, M Han - Journal of Information Security and …, 2024 - Elsevier
Abstract The Internet of Things (IoT) with its evolution brings many benefits to people's
routine life, while at the same time posing various security challenges, due to the lack of …