Incentive techniques for the internet of things: a survey
Abstract The Internet of Things (IoT) has remarkably evolved over the last few years to
realize a wide range of newly emerging services and applications empowered by the …
realize a wide range of newly emerging services and applications empowered by the …
Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms
Purpose Nowadays, more interest is found among the researchers in MANETs in practical
and theoretical areas and their performance under various environments. WSNs have …
and theoretical areas and their performance under various environments. WSNs have …
A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks
Abstract Internet of Things (IoT) has advanced its pervasiveness across the globe for the
development of smart networks. It is aimed to deploy network edge that enables smart …
development of smart networks. It is aimed to deploy network edge that enables smart …
An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks
Security is an important phenomena for energy conservation in wireless sensor networks
(WSN). Moreover, the management of trust in the WSN is a challenging task since trust is …
(WSN). Moreover, the management of trust in the WSN is a challenging task since trust is …
[ספר][B] Systems Benchmarking
S Kounev, KD Lange, J Von Kistowski - 2020 - Springer
In January of 2010, I met Sam and Klaus at the inaugural International Conference on
Performance Engineering (ICPE), in San Jose, USA. I gave the keynote address “Software …
Performance Engineering (ICPE), in San Jose, USA. I gave the keynote address “Software …
A game theory based multi layered intrusion detection framework for VANET
Abstract Vehicular Ad-hoc Networks (VANETs) are vulnerable to various type of network
attacks like Blackhole attack, Denial of Service (DoS), Sybil attack etc. Intrusion Detection …
attacks like Blackhole attack, Denial of Service (DoS), Sybil attack etc. Intrusion Detection …
[HTML][HTML] Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation
Abstract Present Intrusion Detection Systems (IDSs) for MANETs require continuous
monitoring which leads to rapid depletion of a node's battery life. To address this issue, we …
monitoring which leads to rapid depletion of a node's battery life. To address this issue, we …
Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme
A Jesudoss, SVK Raja, A Sulaiman - Ad Hoc Networks, 2015 - Elsevier
This paper proposes a Payment Punishment Scheme (PPS) working along with various
established models to encourage truth telling during election process of the nodes in a …
established models to encourage truth telling during election process of the nodes in a …
Ips: Incentive and punishment scheme for omitting selfishness in the internet of vehicles (iov)
Internet of Vehicles (IoV) is a new emerging concept and is an extended notion of Vehicular
Ad-hoc networks (VANETs). In IoV the vehicles (nodes) are connected to the internet and …
Ad-hoc networks (VANETs). In IoV the vehicles (nodes) are connected to the internet and …
A trust-based secure neuro fuzzy clustering technique for mobile ad hoc networks
A MANET consists of a group of mobile nodes. In a MANET, scalability and mobility have a
greater influence on routing performance. The clustering technique plays a vital role in …
greater influence on routing performance. The clustering technique plays a vital role in …