Application layer security for internet communications: A comprehensive review, challenges, and future trends

D Cevallos-Salas, J Estrada-Jiménez… - Computers and Electrical …, 2024 - Elsevier
The security of Internet communications has traditionally been delegated to controls at lower
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …

New approach of multi-path reliable transmission for marginal wireless sensor network

D Zhang, H Wu, P Zhao, X Liu, Y Cui, L Chen… - Wireless …, 2020 - Springer
In the application environment having dense distribution of marginal wireless sensor
network (WSN), the data transmission process will generate a large number of conflicts …

[HTML][HTML] A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning

M Althunayyan, A Javed, O Rana - Vehicular Communications, 2024 - Elsevier
As connected and autonomous vehicles proliferate, the Controller Area Network (CAN) bus
has become the predominant communication standard for in-vehicle networks due to its …

Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing

M Shariq, M Conti, K Singh, C Lal, AK Das… - Computer Networks, 2024 - Elsevier
With the continuing growth in various research domains such as Artificial Intelligence (AI),
Machine Learning (ML), Big Data Analytics (BDA), and Cloud Computing (CC), the Internet …

Distributed enhanced multi-objective evolutionary algorithm based on decomposition for cluster analysis in wireless sensor network

A Panwar, SJ Nanda - Journal of Network and Computer Applications, 2024 - Elsevier
Conventional clustering algorithms do not recognize patterns and structures with
contradicting objectives in large, distributed datasets. Distributed clustering leverages rapid …

Enhancing anomaly detection: a comprehensive approach with MTBO feature selection and TVETBOOptimized Quad-LSTM classification

RSR NV, N SreeDivya, BN Jagadesh… - Computers and …, 2024 - Elsevier
The rapid growth of computer networks has heightened system vulnerabilities, challenging
traditional Machine Learning (ML) techniques in network anomaly detection due to the …

[HTML][HTML] Artificial Intelligence, Internet of things and 6G methodologies in the context of Vehicular Ad-hoc Networks (VANETs): Survey

B Saoud, I Shayea, AE Yahya, ZA Shamsan… - ICT Express, 2024 - Elsevier
Recent developments in the fields of communications, smart transportation systems and
computer systems have significantly expanded the potential for intelligent solutions in the …

An improved underwater wireless sensor network communication using Internet of Things and signal to noise ratio analysis

K Nellore, PK Polasi - Transactions on Emerging …, 2022 - Wiley Online Library
Underwater acoustic (UWA) channels are widely regarded as one of the most challenging
communication mediums. Low frequencies are best for acoustic propagation, and the …

Analyzing the impact of active attack on the performance of the AMCTD protocol in underwater wireless sensor networks

K Saeed, W Khalil, AS Al-Shamayleh, I Ahmad… - Sensors, 2023 - mdpi.com
The exponentially growing concern of cyber-attacks on extremely dense underwater sensor
networks (UWSNs) and the evolution of UWSNs digital threat landscape has brought novel …

[HTML][HTML] CIBORG: CIrcuit-Based and ORiented Graph theory permutation routing protocol for single-hop IoT networks

AB Bomgni, GBJ Mdemaya, MLF Sindjoung… - Journal of Network and …, 2024 - Elsevier
Abstract The Internet of Things (IoT) has emerged as a promising paradigm which facilitates
the seamless integration of physical devices and digital systems, thereby transforming …