A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure Routing in Wireless Sensor Networks: A State of the Art
2013
International Journal of Computer Applications
Security aspects in routing protocols have not been given enough attention, since most of the routing protocols in WSNs have not been designed with security requirements in mind. ...
It will focus on the attempts of building an Artificial Intelligence (AI) based routing protocols in WSNs. This paper also identifies the WSN security trends and threats. ...
Paradisi [3] study, WSN Routing Protocolsas shown in figure 2 -can be classified in four main categories based upon : -the type of communication routes processed within the network for data transmission ...
doi:10.5120/11405-6724
fatcat:vi555mvhb5a2jk7dcon6c7i3uy
A Novel Approach for Detection of Blackhole Attacks
2014
IOSR Journal of Computer Engineering
In this paper, we propose a solution for detecting black hole attack. Our protocol's name is EBAODV (Enhance Black hole AODV). In this approach, leader nodes are used for detecting black hole nodes. ...
In single black hole attack, one malicious node will change the route of source to destination and wrong path of malicious node will follow. ...
Fig. 1 1 Fig. 1 Infrastructure Network Fig. 2 Mobile Adhoc Network
Fig. 3 3 Routing ProtocolsA Novel Approach For Detection Of Blackhole Attackswww.iosrjournals.org
summarizes comparative analysis ...
doi:10.9790/0661-16256974
fatcat:2rqa2sr3rjhgbpyenqkqntdvim
Comparative Analysis of Routing Protocols AODV, DSDV, DSR &TORA in MANET
2020
Zenodo
In this research, we have investigated various routing protocols such as DSDV, AODV, DSR and TORA on performance basis. ...
For simulations, Network Simulator (NS-2) is recommended. The recommendation of this research will provide an enhanced understanding of protocols. Index Terms - Ad-Hoc, AODV, DSR, DSDV, TORA, NS2 ...
However, MANET had faced various challenges for instance scalability, routing security and power consumption because of its less secure boundaries [2] . ...
doi:10.5281/zenodo.4012094
fatcat:ep4ipw24lvhihgkcszpsgggrdi
A Strategic Review of Routing Protocols for Mobile Ad Hoc Networks
English
2014
International Journal of Engineering Trends and Technoloy
English
This has led to the development of many different routing protocols for MANET. ...
The infrastructureless and the dynamic nature of these networks demand an efficient and reliable routing strategy. ...
Route creation is done using a query-reply mechanism. For creating different zones in the network, a node first has to know who its neighbors are. ...
doi:10.14445/22315381/ijett-v10p274
fatcat:swqbaycjv5ckzk5ikbftg3spbe
Vehicular Communications: A Network Layer Perspective
[article]
2017
arXiv
pre-print
In this paper, we provide a comprehensive overview of recent research on enabling efficient vehicular communications from the network layer perspective. ...
vehicular networks into two categories, i.e., manually driving vehicular networks and automated driving vehicular networks, and then discuss the available communication techniques, network structures, routing ...
Routing ProtocolsA routing protocol specifies the way that two communication entities exchange information with each other. ...
arXiv:1707.09972v1
fatcat:64zaiweplbhs7bgxx6xtp7v2ta
PUF Modeling Attacks on Simulated and Silicon Data
2013
IEEE Transactions on Information Forensics and Security
Our findings lead to new design requirements for secure electrical Strong PUFs, and will be useful to PUF designers and attackers alike. ...
Our method is less relevant for other PUF types such as Weak PUFs; see Section I-B for a detailed discussion of this topic. ...
If nothing else, this gives us an indication for how many runs these PUFs can be used securely within (limited count) identification protocolsà la Pappu et al. [33] , [34] . ...
doi:10.1109/tifs.2013.2279798
fatcat:ziwb7oaplnaszcux2ncb6jdbca
Analysis on IOT Botnet and DDOS attack
unpublished
So, it is highly portable and efficient for code backing up [4] . ...
SSL-Based Attacks Secure Socket Layer (SSL): A method of encryption used by various other network communication protocolsas it grows in prevalence, attackers began targeting it. ...
fatcat:yq64quzqpvdsdh7wmgq54x4ppu
Open Science Diplomacy
2020
Zenodo
Following the call for 'open science, open innovation, and open to the world' by the EU Commissioner for Research, Science and Innovation Carlos Moedas in 2015, we look for applications and implications ...
In a way, the European efforts to implement Open Science could also be seen as catching up, as there is already a large role for Open Science in South America, albeit with different mechanisms and routes ...
Nonetheless, the nature of science infrastructure necessary for effective and efficient scientific collaboration is diversifying. ...
doi:10.5281/zenodo.4479514
fatcat:htyljqfoijenta2esqtqbdva7i
Policing Domestic Violence: Case Study of Organizational Change in the Trenton Police Department, Trenton, New Jersey
2012
unpublished
Several participants also referenced the need for adequate manpower. iii An unanticipated finding was the role of compulsion. ...
In general, this study suggested that external factors, domestic violence homicides, provided impetus for changing domestic violence strategies. ...
This system would provide as a mechanism for smoother more efficient data collection and data review during DV-Stat meetings. ...
fatcat:355guxqx3vgbvpr466qqy5nnne