Secured mobile IOT ecosystem using Enhanced Multi-level Intelligent Trust Scheme
暂无分享,去创建一个
[1] P. Rani,et al. Intelligent transportation system for internet of vehicles based vehicular networks for smart cities , 2023, Comput. Electr. Eng..
[2] N. Kumar,et al. A Deep Comprehensive Research Architecture, Characteristics, Challenges, Issues, and Benefits of Routing Protocol for Vehicular Ad-Hoc Networks , 2022, Int. J. Distributed Syst. Technol..
[3] Hisham G. Daoud,et al. A survey on security in internet of things with a focus on the impact of emerging technologies , 2022, Internet Things.
[4] P. Prakash,et al. Optimized Ensemble Classifier Based Network Intrusion Detection System for RPL Based Internet of Things , 2022, Wireless Personal Communications.
[5] M. Dutta,et al. IoT-Sentry: A Cross-Layer-Based Intrusion Detection System in Standardized Internet of Things , 2021, IEEE Sensors Journal.
[6] Khairul Azmi Abu Bakar,et al. Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model , 2021, Comput. Networks.
[7] Gholamreza Farahani,et al. Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks , 2021, Secur. Commun. Networks.
[8] K. C. Ravishankar,et al. Implementation of Trust-Based Novel Approach for Security Enhancements in MANETs , 2021, SN Computer Science.
[9] Xiangjian He,et al. QASEC: A secured data communication scheme for mobile Ad-hoc networks , 2020, Future Gener. Comput. Syst..
[10] M. Devi,et al. Mobile Ad Hoc Networks and Routing Protocols in IoT Enabled Smart Environment: A Review , 2019, Journal of Engineering and Applied Sciences.
[11] Tao Qin,et al. IMLADS: Intelligent Maintenance and Lightweight Anomaly Detection System for Internet of Things , 2019, Sensors.
[12] G. Geethakumari,et al. Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT , 2018, 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).
[13] Daniele Miorandi,et al. REATO: REActing TO Denial of Service attacks in the Internet of Things , 2018, Comput. Networks.
[14] Sayan Kumar Ray,et al. A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks , 2017 .
[15] Mansour Sheikhan,et al. Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..
[16] Samia Allaoua Chelloug,et al. Energy-Efficient Content-Based Routing in Internet of Things , 2015 .
[17] Guru Nanak,et al. A Novel Approach for Preventing Black-Hole Attack in MANETs , 2014 .
[18] Jaydip Sen,et al. Embedded security for Internet of Things , 2011, 2011 2nd National Conference on Emerging Trends and Applications in Computer Science.
[19] Naziya Hussain,et al. Cyber Security and Privacy of Connected and Automated Vehicles (CAVs)-Based Federated Learning: Challenges, Opportunities, and Open Issues , 2022, Federated Learning for IoT Applications.
[20] Sudip Misra,et al. Deep Learning-Based Reliable Routing Attack Detection Mechanism for Industrial Internet of Things , 2021, Ad Hoc Networks.
[21] Nasib Singh Gill,et al. Novel Algorithm for Enhancing MANET Protocol in Smart Environment , 2019, VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE.
[22] Chung-Horng Lung,et al. Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[23] Naeem Ahmad,et al. Minimizing Broadcast Expenses in Clustered Ad-hoc Networks , 2018, J. King Saud Univ. Comput. Inf. Sci..
[24] Dinesh Goyal,et al. BlackHole Attack and Detection Method for AODV Routing Protocol in MANETs , 2013 .
[25] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..