A systematic review of IP traceback schemes for denial of service attacks

K Singh, P Singh, K Kumar - Computers & Security, 2016 - Elsevier
Internet has always been vulnerable to a variety of security threats as it was originally
designed without apprehending the prospect of security concerns. Modern era has seen …

GraphNEI: A GNN-based network entity identification method for IP geolocation

Z Ma, S Zhang, N Li, T Li, X Hu, H Feng, Q Zhou, F Liu… - Computer Networks, 2023 - Elsevier
Network entity geolocation technology is a technique for inferring geographic location
through features such as network measurements or IP address searchable information, also …

[PDF][PDF] Proposed security mechanism for preventing fake router advertisement attack in IPv6 link-local network

MA Al-Shareeda, S Manickam… - Indones. J. Electr …, 2023 - pdfs.semanticscholar.org
The design of router discovery (RD) is a trust mechanism to confirm the legitimacy of the host
and router. Fake router advertisement (RA) attacks have been made possible by this RD …

Network layer attacks and countermeasures in cognitive radio networks: A survey

M Bouabdellah, N Kaabouch, F El Bouanani… - Journal of information …, 2018 - Elsevier
Spectrum scarcity is the principal motivation behind the development of cognitive radio. This
technology introduces new functionalities at the physical, medium access control, and …

Leveraging IoT Harmonization: An Efficacious NB-IoT Relay for Integrating 6LoWPAN Devices into Legacy IPv4 Networks

E Saavedra, A Santamaria, G del Campo, I Gomez - Applied Sciences, 2024 - mdpi.com
Featured Application This novel approach provides a seamless, straightforward means to
make 6LoWPAN devices—pragmatically any kind of incumbent from IPv6-based IoT …

Evaluation of new CYPHONIC: Overlay network protocol based on Go language

T Yoshikawa, H Komura, C Nishiwaki… - 2022 IEEE …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) spreading requires an interconnection scheme to connect to
each IoT device over the Internet. However, the Internet has several issues about accessible …

Towards ip over lpwans technologies: Lorawan, dash7, nb-iot

W Ayoub, M Mroue, F Nouvel… - … conference on digital …, 2018 - ieeexplore.ieee.org
In this paper, we discuss a set of solutions that are proposed in order to run IPv6 over IoT
and we investigate its applicability over the three Low Power Wide Area Networks …

Comprehensive survey of IPv6 transition technologies: A subjective classification for security analysis

G Lencse, Y Kadobayashi - IEICE Transactions on …, 2019 - search.ieice.org
Due to the depletion of the public IPv4 address pool, the transition to IPv6 became
inevitable. However, this ongoing transition is taking a long time, and the two incompatible …

TCP/ICN: Carrying TCP over content centric and named data networks

I Moiseenko, D Oran - Proceedings of the 3rd ACM Conference on …, 2016 - dl.acm.org
Today's Internet applications and protocols are not compatible with Information Centric
Networking (ICN) protocols and there is no straightforward way of rapidly switching protocol …

[Књига][B] Internet infrastructure: networking, web services, and cloud computing

R Fox, W Hao - 2017 - taylorfrancis.com
Internet Infrastructure: Networking, Web Services, and Cloud Computing provides a
comprehensive introduction to networks and the Internet from several perspectives: the …