A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
In this work, the RFID network life span will be enlarged through an energy-efficient cluster-based protocol used together with the Dragonfly algorithm. ... Thus, for saving energy and to make the best use of the resources, networks should operate and be able to recover in an efficient way. This will also reduce the energy expenditure of RFID readers. ... After the relevant cluster head is selected, and algorithm of a dragonfly is used. ...doi:10.9781/ijimai.2020.05.003 fatcat:l64m2o4trzczfnrg4zgiijpgii
We present a detailed attack methodology adopted by some of the most successful malware attacks on IoT including ICS and CPS. ... We also deduce an attack strategy of a Distributed Denial of Service attack through IoT botnet followed by requisite security measures. ... However, selected standard security protocols can be optimized by removing various optional features. • Security is a holistic property. Hence, it should not be considered in isolation. ...doi:10.1109/comst.2018.2874978 fatcat:5qkflaozurb4nctkfrwswnbce4
To improve the quality of the papers we conduct a peer review process in which each paper is reviewed by at least two other seminar participants and the advisors. ... In the context of the seminar, each student individually works on a relevant topic in the domain of computer networks supervised by one or more advisors. ... used for evaluating better methods for improved security in a multi-clustering wireless sensor network by homomorphic encryption and watermarking  . • Novel Segment Based Safety Message Broadcasting ...doi:10.2313/net-2020-11-1 fatcat:7og3fpqf5zfpfldmtsp57bbcg4