Showing 1 - 10 of 158
cryptography algorithm for identifying compromised node in WSN called Leap Enhanced. Their evaluations on TOSSIM give a precise and … other cryptography schemes in literature. …
Persistent link: https://www.econbiz.de/10012046459
In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Denial of Service (DoS) attack described in...
Persistent link: https://www.econbiz.de/10010676146
IPv6 provides more address space, improved address design, and greater security than IPv4. Different transition mechanisms can be used to migrate from IPv4 to IPv6 which includes dual stack networks, tunnels and translation technologies. Within all of this, network security is an essential...
Persistent link: https://www.econbiz.de/10012043259
Protected data transmission in cluster based Mobile Adhoc Networks (MANETs) is a challenging mission due to the high …
Persistent link: https://www.econbiz.de/10012043266
Recently, Om et al. proposed three-factor remote user authentication protocol using ElGamal cryptosystem and ensured that it is withstands to various kinds of security attacks. But, the authors review carefully Om et al.'s scheme and discover that it unable to resist three attacks (like password...
Persistent link: https://www.econbiz.de/10012043273
using hybrid DNA-based cryptography (HDC) mechanism. Moreover, the proposed method upsurge the security issue with the … underlying AODV routing protocol. Eventually, This Hybrid DNA-based Cryptography (HDC) is one of the high potential candidates …
Persistent link: https://www.econbiz.de/10012045679
Vehicular Ad Hoc Networks (VANETs) are considered as a special case of mobile Ad Hoc Networks (MANETs) and are recently …
Persistent link: https://www.econbiz.de/10012045940
The applications of a mobile ad hoc network (MANET) range from military and disaster response to commercial and civilian environments. The intrinsic characteristics like lack of infrastructure, self-organizing nature and deployment flexibility contributes to its usefulness but few other features...
Persistent link: https://www.econbiz.de/10012046494
Clustering approaches for mobile wireless sensor networks (WSNs) tend to extend the battery life of the individual sensors and the network lifetime. Taking into account the mobility of the network, a powerful mechanism to safely elect a cluster head is a challenging task in many research works....
Persistent link: https://www.econbiz.de/10012048691
Persistent link: https://www.econbiz.de/10011502991