Filters








3 Hits in 8.9 sec

A Holistic Methodology for Improved RFID Network Lifetime by Advanced Cluster Head Selection using Dragonfly Algorithm

Pramod Rathore, Abhishek Kumar Singh, Vicente García-Díaz
2020 International Journal of Interactive Multimedia and Artificial Intelligence  
In this work, the RFID network life span will be enlarged through an energy-efficient cluster-based protocol used together with the Dragonfly algorithm.  ...  Thus, for saving energy and to make the best use of the resources, networks should operate and be able to recover in an efficient way. This will also reduce the energy expenditure of RFID readers.  ...  After the relevant cluster head is selected, and algorithm of a dragonfly is used.  ... 
doi:10.9781/ijimai.2020.05.003 fatcat:l64m2o4trzczfnrg4zgiijpgii

Anatomy of Threats to The Internet of Things

Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Ren Ping Liu, Wei Ni
2018 IEEE Communications Surveys and Tutorials  
We present a detailed attack methodology adopted by some of the most successful malware attacks on IoT including ICS and CPS.  ...  We also deduce an attack strategy of a Distributed Denial of Service attack through IoT botnet followed by requisite security measures.  ...  However, selected standard security protocols can be optimized by removing various optional features. • Security is a holistic property. Hence, it should not be considered in isolation.  ... 
doi:10.1109/comst.2018.2874978 fatcat:5qkflaozurb4nctkfrwswnbce4

Proceedings of the Seminar Innovative Internet Technologies and Mobile Communications (IITM), Summer Semester 2020

Georg Carle, Stephan Günther, Benedikt Jaeger, Chair Of Network Architectures
2020
To improve the quality of the papers we conduct a peer review process in which each paper is reviewed by at least two other seminar participants and the advisors.  ...  In the context of the seminar, each student individually works on a relevant topic in the domain of computer networks supervised by one or more advisors.  ...  used for evaluating better methods for improved security in a multi-clustering wireless sensor network by homomorphic encryption and watermarking [18] . • Novel Segment Based Safety Message Broadcasting  ... 
doi:10.2313/net-2020-11-1 fatcat:7og3fpqf5zfpfldmtsp57bbcg4