ARTÍCULO
TITULO

ROUTING SECURITY IN WIRELESS AD HOC NETWORKS

Deng    
H. Li    
W. Agrawal    
D. P.    

Resumen

No disponible

 Artículos similares

       
 
Shuang Guo, Yarong Du and Liang Liu    
In order to achieve reliability, security, and scalability, the request flow in the Internet of Things (IoT) needs to pass through the service function chain (SFC), which is composed of series-ordered virtual network functions (VNFs), then reach the dest... ver más
Revista: Applied Sciences

 
Sarmad Javed, Ahthasham Sajid, Tayybah Kiren, Inam Ullah Khan, Christine Dewi, Francesco Cauteruccio and Henoch Juli Christanto    
The increasing use of wireless communication and IoT devices has raised concerns about security, particularly with regard to attacks on the Routing Protocol for Low-Power and Lossy Networks (RPL), such as the wormhole attack. In this study, the authors h... ver más
Revista: Information

 
Argyrios Sideris and Minas Dasygenis    
Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted dat... ver más
Revista: Computation

 
Jiazhu Dai and Siwei Xiong    
Capsule networks are a type of neural network that use the spatial relationship between features to classify images. By capturing the poses and relative positions between features, this network is better able to recognize affine transformation and surpas... ver más
Revista: Algorithms

 
Burhan Ul Islam Khan, Farhat Anwar, Farah Diyana Bt. Abdul Rahman, Rashidah Funke Olanrewaju, Khang Wen Goh, Zuriati Janin and Md Arafatur Rahman    
This paper introduces a computational strategic game model capable of mitigating the adversarial impact of node misbehaviour in large-scale Internet of Things (IoT) deployments. This security model?s central concept is to preclude the participation of mi... ver más
Revista: Information