9 Hits in 1.7 sec

Secure Routing in Wireless Sensor Networks: A State of the Art

A. M.Riad, Hamdy K. El-Minir, Mohamed El-hoseny
2013 International Journal of Computer Applications  
Security aspects in routing protocols have not been given enough attention, since most of the routing protocols in WSNs have not been designed with security requirements in mind.  ...  It will focus on the attempts of building an Artificial Intelligence (AI) based routing protocols in WSNs. This paper also identifies the WSN security trends and threats.  ...  Paradisi [3] study, WSN Routing Protocolsas shown in figure 2 -can be classified in four main categories based upon : -the type of communication routes processed within the network for data transmission  ... 
doi:10.5120/11405-6724 fatcat:vi555mvhb5a2jk7dcon6c7i3uy

A Novel Approach for Detection of Blackhole Attacks

Ankita V. Rachh, Yatin V. Shukla, Tejas R. Rohit
2014 IOSR Journal of Computer Engineering  
In this paper, we propose a solution for detecting black hole attack. Our protocol's name is EBAODV (Enhance Black hole AODV). In this approach, leader nodes are used for detecting black hole nodes.  ...  In single black hole attack, one malicious node will change the route of source to destination and wrong path of malicious node will follow.  ...  Fig. 1 1 Fig. 1 Infrastructure Network Fig. 2 Mobile Adhoc Network Fig. 3 3 Routing ProtocolsA Novel Approach For Detection Of Blackhole summarizes comparative analysis  ... 
doi:10.9790/0661-16256974 fatcat:2rqa2sr3rjhgbpyenqkqntdvim

Comparative Analysis of Routing Protocols AODV, DSDV, DSR &TORA in MANET

Beenish Gul, Wajid Ullah Khan, Syed Irfanullah, Abdus Salam, Usman Zeb, Sadaf Wali, Hafsa Naheed
2020 Zenodo  
In this research, we have investigated various routing protocols such as DSDV, AODV, DSR and TORA on performance basis.  ...  For simulations, Network Simulator (NS-2) is recommended. The recommendation of this research will provide an enhanced understanding of protocols. Index Terms - Ad-Hoc, AODV, DSR, DSDV, TORA, NS2  ...  However, MANET had faced various challenges for instance scalability, routing security and power consumption because of its less secure boundaries [2] .  ... 
doi:10.5281/zenodo.4012094 fatcat:ep4ipw24lvhihgkcszpsgggrdi

A Strategic Review of Routing Protocols for Mobile Ad Hoc Networks

A. Samuel Chellathurai, E.George Dharma Prakash Raj
2014 International Journal of Engineering Trends and Technoloy  
This has led to the development of many different routing protocols for MANET.  ...  The infrastructureless and the dynamic nature of these networks demand an efficient and reliable routing strategy.  ...  Route creation is done using a query-reply mechanism. For creating different zones in the network, a node first has to know who its neighbors are.  ... 
doi:10.14445/22315381/ijett-v10p274 fatcat:swqbaycjv5ckzk5ikbftg3spbe

Vehicular Communications: A Network Layer Perspective [article]

Haixia Peng, Le Liang, Xuemin Shen, Geoffrey Ye Li
2017 arXiv   pre-print
In this paper, we provide a comprehensive overview of recent research on enabling efficient vehicular communications from the network layer perspective.  ...  vehicular networks into two categories, i.e., manually driving vehicular networks and automated driving vehicular networks, and then discuss the available communication techniques, network structures, routing  ...  Routing ProtocolsA routing protocol specifies the way that two communication entities exchange information with each other.  ... 
arXiv:1707.09972v1 fatcat:64zaiweplbhs7bgxx6xtp7v2ta

PUF Modeling Attacks on Simulated and Silicon Data

Ulrich Ruhrmair, Jan Solter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jurgen Schmidhuber, Wayne Burleson, Srinivas Devadas
2013 IEEE Transactions on Information Forensics and Security  
Our findings lead to new design requirements for secure electrical Strong PUFs, and will be useful to PUF designers and attackers alike.  ...  Our method is less relevant for other PUF types such as Weak PUFs; see Section I-B for a detailed discussion of this topic.  ...  If nothing else, this gives us an indication for how many runs these PUFs can be used securely within (limited count) identification protocolsà la Pappu et al. [33] , [34] .  ... 
doi:10.1109/tifs.2013.2279798 fatcat:ziwb7oaplnaszcux2ncb6jdbca

Analysis on IOT Botnet and DDOS attack

Md Walid Bin, Nur-13101112 Supervisor, Sadia, Hamid Kazi
So, it is highly portable and efficient for code backing up [4] .  ...  SSL-Based Attacks Secure Socket Layer (SSL): A method of encryption used by various other network communication protocolsas it grows in prevalence, attackers began targeting it.  ... 

Open Science Diplomacy

Katja Mayer
2020 Zenodo  
Following the call for 'open science, open innovation, and open to the world' by the EU Commissioner for Research, Science and Innovation Carlos Moedas in 2015, we look for applications and implications  ...  In a way, the European efforts to implement Open Science could also be seen as catching up, as there is already a large role for Open Science in South America, albeit with different mechanisms and routes  ...  Nonetheless, the nature of science infrastructure necessary for effective and efficient scientific collaboration is diversifying.  ... 
doi:10.5281/zenodo.4479514 fatcat:htyljqfoijenta2esqtqbdva7i

Policing Domestic Violence: Case Study of Organizational Change in the Trenton Police Department, Trenton, New Jersey

Michele-Lynne Muni
2012 unpublished
Several participants also referenced the need for adequate manpower. iii An unanticipated finding was the role of compulsion.  ...  In general, this study suggested that external factors, domestic violence homicides, provided impetus for changing domestic violence strategies.  ...  This system would provide as a mechanism for smoother more efficient data collection and data review during DV-Stat meetings.  ...