Anomaly-based intrusion detection system for IoT application

M Bhavsar, K Roy, J Kelly, O Olusola - Discover Internet of things, 2023 - Springer
Abstract Internet-of-Things (IoT) connects various physical objects through the Internet and it
has a wide application, such as in transportation, military, healthcare, agriculture, and many …

A review on c3i systems' security: Vulnerabilities, attacks, and countermeasures

H Ahmad, I Dharmadasa, F Ullah, MA Babar - ACM Computing Surveys, 2023 - dl.acm.org
Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in
critical civil and military domains for achieving information superiority, operational efficacy …

Cluster-based classical routing protocols and authentication algorithms in WSN: a survey based on procedures and methods

RK Yadav, R Mishra - Wireless Personal Communications, 2022 - Springer
Wireless sensor system (WSN) is an assortment of miniature sensor knobs with some
limitations. But in today's world, we are searching for the approach which provides cost …

Enhanced data accuracy based PATH discovery using backing route selection algorithm in MANET

RP Premanand, A Rajaram - Peer-to-Peer Networking and Applications, 2020 - Springer
Unstable Mobile nodes in the network does not maintain the accuracy of data transmission
at the maximum level since the node's characteristics are updated, then nodes receive …

A cooperative watchdog model based on Dempster–Shafer for detecting misbehaving vehicles

OA Wahab, H Otrok, A Mourad - Computer Communications, 2014 - Elsevier
In this paper, we address the problem of detecting misbehaving vehicles in Vehicular Ad
Hoc Network (VANET) using Quality of Service Optimized Link State Routing (QoS-OLSR) …

Security issues in flying ad-hoc networks (FANETS)

İ Bekmezci, E Şentürk, T Türker - Journal of Aeronautics and …, 2016 - jast.hho.msu.edu.tr
Abstract Technological advancements in Unmanned Aerial Vehicles (UAV) encourage the
use of multi-UAV systems in military and civil applications. The most important benefit of the …

A novel optimally weighted framework of piecewise gamma corrected fractional order masking for satellite image enhancement

H Singh, A Kumar, LK Balyan, GK Singh - Computers & Electrical …, 2019 - Elsevier
A novel image quality enhancement framework is proposed here through a collective
inspiration of the exponential, differential and linear operational behavior of pixel intensities …

Secure routing protocol design for UAV ad hoc networks

JA Maxa, MSB Mahmoud… - 2015 IEEE/AIAA 34th …, 2015 - ieeexplore.ieee.org
UAV Ad hoc NETworks (UAANETs) can be defined as a new form of ad hoc networks in
which nodes are Unmanned Aerial Vehicles (UAVs) and Ground Control Station (GCS) …

[PDF][PDF] Classification of attacks on wireless sensor networks: A survey

MN Riaz, A Buriro, A Mahboob - International Journal of Wireless …, 2018 - researchgate.net
Abstract Wireless Sensor Networks (WSN) is one of the fastest rising emerging technologies
that find widespread use in various applications comprising of military, health, agriculture …

Distributed Edge Caching for Zero Trust-Enabled Connected and Automated Vehicles: A Multi-Agent Reinforcement Learning Approach

X Xu, X Zhou, X Zhou, M Bilal, L Qi… - IEEE Wireless …, 2024 - ieeexplore.ieee.org
Zero Trust model enhances the security of wireless network environments, which is thought
to be effectively applicable to Connected and automated vehicles (CAVs). Considering the …