|
|
|
Zulfiqar Ali Zardari, Jingsha He, Nafei Zhu, Khalid Hussain Mohammadani, Muhammad Salman Pathan, Muhammad Iftikhar Hussain and Muhammad Qasim Memon
A mobile ad-hoc network (MANET) is a temporary network of wireless mobile nodes. In a MANET, it is assumed that all of the nodes cooperate with each other to transfer data packets in a multi-hop fashion. However, some malicious nodes don?t cooperate with...
ver más
|
|
|
|
|
|
|
Qingfeng Jiang, Kun Deng, Lei Zhang and Chun Liu
In the utility-based routing protocol of delay-tolerant networks (DTNs), nodes calculate routing utility value by encounter time, frequency, and so on, and then forward messages according to the utility. The privacy information of encounter time and freq...
ver más
|
|
|
|
|
|
|
Wenjuan Li, Weizhi Meng and Lam For Kwok
Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing int...
ver más
|
|
|
|
|
|
|
Rezvan Almas Shehni, Karim Faez, Farshad Eshghi and Manoochehr Kelarestaghi
Wide-spread deployment of Wireless Sensor Networks (WSN) necessitates special attention to security issues, amongst which Sybil attacks are the most important ones. As a core to Sybil attacks, malicious nodes try to disrupt network operations by creating...
ver más
|
|
|
|
|
|
|
Anhtuan Le, Jonathan Loo, Kok Keong Chai and Mahdi Aiash
Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network performance significantly by disrupting the optimal protocol structure. To detect such threats, we propose a RPL-specification, obtained by a semi-auto prof...
ver más
|
|
|
|