Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS: Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS
International Journal of Information Security (IJOIS), Volume 24, Issue 1https://doi.org/10.1007/s10207-024-00958-1AbstractEnsuring the security of Wi-Fi networks is a top priority and an ongoing research topic for academic and industry research groups. This work investigates the impact of class distribution in benchmark datasets on the detection performance of ...
- research-articleNovember 2024
A novel secured authentication model for LTE network system using BD-POA-HECC, HD-MAC, and PD-3WHP techniques
Expert Systems with Applications: An International Journal (EXWA), Volume 258, Issue Chttps://doi.org/10.1016/j.eswa.2024.124967AbstractNowadays, in comparison to 6G in the mobile telecom landscape, the Long Term Evolution (LTE) user network is utilized by the largest population because of its adaptability with highly developed authentication and encryption models. Nevertheless, ...
- research-articleNovember 2024
A Robust Mutual Authentication Scheme for Health-Focused Connected Intelligent Objects
AbstractThe technology of connected intelligent objects dedicated to health has become a buzzword in medical circles. It has emerged as a popular trend in the world of health technology, but its growing popularity also raises concerns about security. ...
- research-articleOctober 2024
Stacking Enabled Ensemble Learning Based Intrusion Detection Scheme (SELIDS) for IoV
AbstractA revolutionary approach for enhancing driving efficiency and safety in intelligent transportation systems (ITS) is deploying autonomous vehicles. Vehicle-to-everything (V2X) technology facilitates interactions between vehicles and infrastructure. ...
- research-articleOctober 2024
An IoT Cloud Security System Powered by Blockchain for Secure Preservation of Electronic Health Records
AbstractCommon public under-monitored medical care – patients have multiple medical reports from multiple hospitals around the globe. The timely availability of medical reports from multiple sources without any tampering is crucial for patients under ...
-
- research-articleOctober 2024
A Robust Model for Predicting Abnormal Behavior in Vehicular Networks using AdaBoost and Chi-Square
Wireless Personal Communications: An International Journal (WPCO), Volume 138, Issue 4Pages 2583–2611https://doi.org/10.1007/s11277-024-11615-0AbstractNowadays, VANETs are becoming a very interesting research topic for researchers as the benefits are very high in terms of ensuring driver comfort, enhancing road effectiveness and minimizing the risk of accidents. VANET is a wireless network ...
- research-articleSeptember 2024
MCTE-RPL: A multi-context trust-based efficient RPL for IoT
Journal of Network and Computer Applications (JNCA), Volume 229, Issue Chttps://doi.org/10.1016/j.jnca.2024.103937AbstractThe Internet of things (IoT) is highly exposed to various attacks due to its sensitive applications, but it is very vulnerable in dealing with these attacks. So, various studies have been introduced to improve IoT security. Most of methods have ...
- research-articleAugust 2024
GLSBIoT: GWO-based enhancement for lightweight scalable blockchain for IoT with trust based consensus
Future Generation Computer Systems (FGCS), Volume 159, Issue CPages 64–76https://doi.org/10.1016/j.future.2024.05.008AbstractBlockchain technology, which has gained much attention from researchers, faces challenges when applied to resource-constrained devices in the Internet of Things (IoT). These challenges include significant network overhead and energy-intensive ...
Highlights- An broad survey on lightweight scalable blockchain solutions pertain to scalability.
- To optimize blockchain operations, a trust-based ensemble consensus was developed.
- Sidechain scalability has been improved by incorporating GWO ...
- review-articleJuly 2024
Review of Security and Privacy-Based IoT Smart Home Access Control Devices
Wireless Personal Communications: An International Journal (WPCO), Volume 137, Issue 3Pages 1601–1640https://doi.org/10.1007/s11277-024-11405-8AbstractThe Internet of Things (IoT) represents a network framework comprising identifiable entities that interact through the Internet. One of its applications is the smart home, where household devices can be remotely monitored and controlled. This has ...
- review-articleJuly 2024
A Survey on 6LoWPAN Security for IoT: Taxonomy, Architecture, and Future Directions
Wireless Personal Communications: An International Journal (WPCO), Volume 137, Issue 1Pages 153–197https://doi.org/10.1007/s11277-024-11382-yAbstractProvisioning security to the communications, data, and partaking things in resource-constrained IoT is a huge challenge. Due to the scalability and interoperability among low power-consuming networks, 6LoWPAN is used widely in IoT. However, ...
- research-articleJune 2024
Introduction to Audio Deepfake Generation: Academic Insights for Non-Experts
MAD '24: Proceedings of the 3rd ACM International Workshop on Multimedia AI against DisinformationPages 3–12https://doi.org/10.1145/3643491.3660286With the advancement of artificial intelligence, the methods for generating audio deepfakes have improved, but the technology behind it has become more complex. Despite this, non-expert users are able to generate audio deepfakes due to the increased ...
- research-articleMay 2024
Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations
Journal of Network and Systems Management (JNSM), Volume 32, Issue 3https://doi.org/10.1007/s10922-024-09827-7AbstractVehicular ad hoc networks (VANET) facilitate vehicle to everything (V2X) communication between vehicles and road side units (RSU) to exchange safety and alert messages required for the successful implementation of VANET applications. However, ...
- review-articleJuly 2024
A review on client-server attacks and defenses in federated learning
AbstractFederated Learning (FL) offers decentralized machine learning (ML) capabilities while potentially safeguarding data privacy. However, this architecture introduces unique security challenges. This paper presents a comprehensive survey of these ...
- research-articleJuly 2024
EAP: An effective black-box impersonation adversarial patch attack method on face recognition in the physical world
AbstractFace recognition models and systems based on deep neural networks are vulnerable to adversarial examples. However, existing attacks on face recognition are either impractical or ineffective for black-box impersonation attacks in the physical ...
- research-articleApril 2024
VMRF: revolutionizing military border surveillance with extensive coverage and connectivity
Telecommunications Systems (TESY), Volume 86, Issue 3Pages 481–502https://doi.org/10.1007/s11235-024-01125-6AbstractNowadays, wireless sensor networks (WSNs) are utilised in military-based applications like border surveillance. However, existing border surveillance methods have difficulties with energy efficiency, latency, security, connectivity, optimal path ...
- research-articleFebruary 2024
Machine learning based smart intrusion and fault identification (SIFI) in inverter based cyber-physical microgrids
Expert Systems with Applications: An International Journal (EXWA), Volume 238, Issue PFhttps://doi.org/10.1016/j.eswa.2023.122291AbstractThe paper presents a machine learning based Smart Intrusion and Fault Identification (SIFI) method to identify the cyber-physical abnormalities in an inverter-based cyber-physical microgrid (CPM). The SIFI method utilizes an ensemble classifier (...
- research-articleApril 2024
An optimized neural network for prediction of security threats on software testing
AbstractSoftware testing involves evaluating and confirming a software program or product to ensure it operates according to its intended functionality. Testing offers advantages like bug prevention, reduced development expenses, and improved ...
- research-articleJanuary 2024
A formal security analysis of the fast authentication procedure based on the security context in 5G networks
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 28, Issue 3Pages 1865–1881https://doi.org/10.1007/s00500-023-09486-xAbstractThe security context, generally stored in the universal subscriber identity module card or the baseband chip, is the critical information applied by the subscriber to access the 5G network during the fast authentication procedure. Once exposed or ...
- articleFebruary 2024
Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions
AbstractEdge computing has emerged as the dominant communication technology connecting IoT and cloud, offering reduced latency and harnessing the potential of edge devices. However, its widespread adoption has also introduced various security ...
- research-articleMay 2024
Stationary Wavelet Transform-Based Semi-Blind Medical Image Watermarking
ICFNDS '23: Proceedings of the 7th International Conference on Future Networks and Distributed SystemsPages 165–172https://doi.org/10.1145/3644713.3644734Securing medical images exchanged through untrusted communication networks has become an absolute necessity. This security covers several aspects such as the protection of property rights, authentication, integrity, etc. To ensure high security, image ...