[go: up one dir, main page]

Chakravorty et al., 2024 - Google Patents

An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET

Chakravorty et al., 2024

Document ID
6731919585495761926
Author
Chakravorty R
Prakash J
Srivastava A
Publication year
Publication venue
Soft Computing

External Links

Snippet

Today, more than ever, the necessity for remote availability, independent of a client's location, is driving the popularity of remote systems. WiFi, Bluetooth, and GPRS are just a few of the wireless technologies that have facilitated the widespread availability of the …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
    • H04L69/322Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/104Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/18Multi-protocol handler, e.g. single device capable of handling multiple protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W76/00Connection management, e.g. connection set-up, manipulation or release
    • H04W76/02Connection set-up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/02Communication control; Communication processing contains provisionally no documents
    • H04L29/06Communication control; Communication processing contains provisionally no documents characterised by a protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation, e.g. WAP [Wireless Application Protocol]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks

Similar Documents

Publication Publication Date Title
Mabodi et al. Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication
Zaminkar et al. SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism
Elhoseny et al. Secure data transmission in WSN: An overview
Mittal et al. X-vine: Secure and pseudonymous routing using social networks
Pamarthi et al. Adaptive key management-based cryptographic algorithm for privacy preservation in wireless mobile adhoc networks for IoT applications
Albinali et al. Toward RPL attacks and mitigation taxonomy: Systematic literature review approach
Chakravorty et al. An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET
Boukerche et al. Design guidelines for machine learning-based cybersecurity in internet of things
Ramasamy et al. E2DA: Energy efficient data aggregation and end-to-end security in 3D reconfigurable WSN
Ramamoorthi et al. Energy aware Clustered blockchain data for IoT: An end-to-end lightweight secure & Enroute filtering approach
Saeed et al. Data-driven techniques and security issues in wireless networks
Ebazadeh et al. A reliable and secure method for network‐layer attack discovery and elimination in mobile ad‐hoc networks based on a probabilistic threshold
Shukla et al. Finding Robust Assailant Using Optimization Functions (FiRAO‐PG) in Wireless Sensor Network
Cheng et al. Diffusion models for information dissemination dynamics in wireless complex communication networks
Durga Devi et al. Malicious node and malicious observer node detection system in MANETs
Khan et al. Exploiting Blockchain and RMCV‐Based Malicious Node Detection in ETD‐LEACH for Wireless Sensor Networks
Kokila et al. BlockDLO: Blockchain computing with deep learning orchestration for secure data communication in IoT Environment
Karankar et al. A comprehensive survey on internet of things security: challenges and solutions
Ram et al. Security Challenges in Wireless Sensor Network: Current Status and Future Trends
Kumar et al. Advanced network security with an integrated trust-based intrusion detection system for routing protocol
Dhanushkodi et al. BGHO‐E2EB Model: Enhancing IoT Security With Gaussian Artificial Hummingbird Optimization and Blockchain Technology
Srinivasan Innovative cross-layer defense mechanisms for blackhole and wormhole attacks in wireless ad-hoc networks
Hu et al. A Novel Attack‐and‐Defense Signaling Game for Optimal Deceptive Defense Strategy Choice
CN110601878B (en) Method for constructing stealth network
Sarkar Neural coordination through spider monkey optimization-guided weight synchronization