|
|
|
Danilo Pau, Andrea Pisani and Antonio Candelieri
In the context of TinyML, many research efforts have been devoted to designing forward topologies to support On-Device Learning. Reaching this target would bring numerous advantages, including reductions in latency and computational complexity, stronger ...
ver más
|
|
|
|
|
|
|
Messaoud Benguenane, Ahmed Korichi, Bouziane Brik and Nadjet Azzaoui
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due to the distinct characteristics of such networks, such as their highly dynamic topology and frequent connectivity disruptions. Jellyfish attacks are a sort of...
ver más
|
|
|
|
|
|
|
Bochuan Hou, Yang Xin, Hongliang Zhu, Yixian Yang and Jianhua Yang
Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats from mu...
ver más
|
|
|
|
|
|
|
Ying Zhang, Qi Zhang, Yu Zhang and Zhiyuan Zhu
Ocean wireless sensor networks (OWSNs) play an important role in marine environment monitoring, underwater target tracking, and marine defense. OWSNs not only monitor the surface information in real time but also act as an important relay layer for under...
ver más
|
|
|
|
|
|
|
Abdullah Al Hayajneh, Md Zakirul Alam Bhuiyan and Ian McAndrew
This paper builds upon the foundation and clarifies specifications for a necessary security protocol in Wireless Sensor Networks (WSNs) with cooperative communications. It is designed to enhance performance and resiliency against cyber-attacks. Recent li...
ver más
|
|
|
|
|
|
|
Muhammad Salman Pathan, Nafei Zhu, Jingsha He, Zulfiqar Ali Zardari, Muhammad Qasim Memon and Muhammad Iftikhar Hussain
Due to the dynamism of topology, sharing of bandwidth and constraint of resources in wireless nodes, the provision of quality of service (QoS) for routing in mobile ad hoc networks (MANETs) presents a great challenge. Security is another crucial aspect o...
ver más
|
|
|
|
|
|
|
Anhtuan Le, Jonathan Loo, Kok Keong Chai and Mahdi Aiash
Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network performance significantly by disrupting the optimal protocol structure. To detect such threats, we propose a RPL-specification, obtained by a semi-auto prof...
ver más
|
|
|
|