Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …
among researchers in the development of theoretical and practical concepts, and their …
Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks
The blackhole attack is one of the simplest yet effective attacks that target the AODV
protocol. Blackhole attackers exploit AODV parameters in order to win route requests, and …
protocol. Blackhole attackers exploit AODV parameters in order to win route requests, and …
A novel approach for mitigating route request flooding attack in MANET
Mobile ad-hoc network (MANET) is a temporary network in which the main requirement for
establishing the communication path among nodes is that the nodes should be cooperative …
establishing the communication path among nodes is that the nodes should be cooperative …
RETINA: Distributed and secure trust management for smart grid applications and energy trading
The rapid adoption of smart grids demands robust security and efficiency measures due to
their critical role in delivering electricity and their potential for customer-oriented benefits …
their critical role in delivering electricity and their potential for customer-oriented benefits …
Polymorphic adversarial cyberattacks using WGAN
R Chauhan, U Sabeel, A Izaddoost… - Journal of Cybersecurity …, 2021 - mdpi.com
Intrusion Detection Systems (IDS) are essential components in preventing malicious traffic
from penetrating networks and systems. Recently, these systems have been enhancing their …
from penetrating networks and systems. Recently, these systems have been enhancing their …
CUREX: seCUre and pRivate hEalth data eXchange
The Health sector's increasing dependence on digital information and communication
infrastructures renders it vulnerable to privacy and cybersecurity threats, especially as the …
infrastructures renders it vulnerable to privacy and cybersecurity threats, especially as the …
Distributed key management in microgrids
Security for smart industrial systems is prominent due to the proliferation of cyber threats
threatening national critical infrastructures. Smart grid comes with intelligent applications …
threatening national critical infrastructures. Smart grid comes with intelligent applications …
A security evaluation of FIDO's UAF protocol in mobile and embedded devices
Abstract The FIDO (Fast Identity Online) Universal Authentication Framework is a new
authentication mechanism that replaces passwords, simplifying the process of user …
authentication mechanism that replaces passwords, simplifying the process of user …
An integrated incentive and trust-based optimal path identification in ad hoc on-demand multipath distance vector routing for MANET
AO Alkhamisi, SM Buhari… - … Journal of Grid and …, 2020 - inderscienceonline.com
A Mobile Ad hoc Network (MANET) can work well only when the mobile nodes behave
cooperatively in packet routing. To reduce the hazards from malicious nodes and enhance …
cooperatively in packet routing. To reduce the hazards from malicious nodes and enhance …
Automatic deployment of specification-based intrusion detection in the BACnet protocol
Specification-based intrusion detection (SB-ID) is a suitable approach to monitor Building
Automation Systems (BASs) because the correct and non-compromised functioning of the …
Automation Systems (BASs) because the correct and non-compromised functioning of the …