|
|
|
Shuang Guo, Yarong Du and Liang Liu
In order to achieve reliability, security, and scalability, the request flow in the Internet of Things (IoT) needs to pass through the service function chain (SFC), which is composed of series-ordered virtual network functions (VNFs), then reach the dest...
ver más
|
|
|
|
|
|
Sarmad Javed, Ahthasham Sajid, Tayybah Kiren, Inam Ullah Khan, Christine Dewi, Francesco Cauteruccio and Henoch Juli Christanto
The increasing use of wireless communication and IoT devices has raised concerns about security, particularly with regard to attacks on the Routing Protocol for Low-Power and Lossy Networks (RPL), such as the wormhole attack. In this study, the authors h...
ver más
|
|
|
|
|
|
Argyrios Sideris and Minas Dasygenis
Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted dat...
ver más
|
|
|
|
|
|
Jiazhu Dai and Siwei Xiong
Capsule networks are a type of neural network that use the spatial relationship between features to classify images. By capturing the poses and relative positions between features, this network is better able to recognize affine transformation and surpas...
ver más
|
|
|
|
|
|
Burhan Ul Islam Khan, Farhat Anwar, Farah Diyana Bt. Abdul Rahman, Rashidah Funke Olanrewaju, Khang Wen Goh, Zuriati Janin and Md Arafatur Rahman
This paper introduces a computational strategic game model capable of mitigating the adversarial impact of node misbehaviour in large-scale Internet of Things (IoT) deployments. This security model?s central concept is to preclude the participation of mi...
ver más
|
|
|