-
21
Secrecy Capacity and Efficiency Outage Analysis of Cooperative PHY-Secure Wireless Systems and Secrecy Capacity-Based RIS Design
Published 2025-01-01“…In this work, we consider a four-node, dual hop, eavesdropper-aware cooperative PHY-security model. …”
Get full text
Article -
22
SC-Route: A Scalable Cross-Layer Secure Routing Method for Multi-Hop Inter-Domain Wireless Networks
Published 2025-05-01“…Multi-hop inter-domain wireless networks play a vital role in future heterogeneous communication systems by improving data transmission efficiency and security assurance. Despite the advances in secure routing techniques in areas such as node authentication and encryption, they still suffer from the shortcomings of frequent key updates, high computational overhead, and poor adaptability to large-scale dynamic topologies. …”
Get full text
Article -
23
New Ethereum-based distributed PKI with a reward-and-punishment mechanism
Published 2025-03-01“…Comparative simulations between ETHERST version 2.0 and ETHERST version 3.0 reveal the superior performance of the latter in trustworthiness measurement and ensure the higher security of a virtual community. …”
Get full text
Article -
24
Enhancing security and efficiency in Mobile Ad Hoc Networks using a hybrid deep learning model for flooding attack detection
Published 2025-01-01“…These advancements underline the model’s superiority in detecting malicious nodes, conserving energy, and ensuring reliable network performance. …”
Get full text
Article -
25
PSLDV-Hop: a robust localization algorithm for WSN using PSO and refinement process
Published 2025-07-01“…By utilizing an improved iterative evolution algorithm, the PSLDV-Hop algorithm reduces localization errors by achieving a higher degree of accuracy in node localization. Simulation results demonstrate their superiority over other classical improved algorithms and the original distance vector hop. …”
Get full text
Article -
26
Joint beamforming and cooperative jamming for secure transmission in multi-antenna decode-and-forward relaying sensor networks: A greedy switching strategy
Published 2017-05-01“…In wireless sensor networks, sensor nodes are deployed to collect data and deliver the sensed information to a base station in a wireless manner. …”
Get full text
Article -
27
Secure Cooperative Dual-RIS-Aided V2V Communication: An Evolutionary Transformer–GRU Framework for Secrecy Rate Maximization in Vehicular Networks
Published 2025-07-01“…In this paper, we investigate the problem of secrecy rate maximization in a cooperative dual-RIS-aided V2V communication network, where two cascaded RISs are deployed to collaboratively assist with secure data transmission between mobile vehicular nodes in the presence of eavesdroppers. …”
Get full text
Article -
28
Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA
Published 2024-12-01“…Blockchain has several unique features: data integrity, security, privacy, and immutability. For this reason, it is considered one of the most promising new technologies for a wide range of applications. …”
Get full text
Article -
29
A comprehensive decision assessment for trust evaluation in wireless sensor networks
Published 2025-01-01“…This study endeavors to tackle the pressing issue of network security within Wireless Sensor Networks (WSNs) through the introduction of an innovative integrated Pythagorean fuzzy-based method for evaluating network nodes. …”
Get full text
Article -
30
A Robust Authentication and Trust Detection With Privacy Preservation of Data for Fog Computing in VANET Using Adaptive Deep Neural Network
Published 2024-01-01“…Trust detection and node authentication within fog computing for the Vehicle Ad-hoc Networks (VANETs) are used to determine whether the automobiles and other infrastructure elements including Roadside Units (RSUs) are valid and secure before permitting them to function on the system. …”
Get full text
Article -
31
Context-Aware Trust and Reputation Routing Protocol for Opportunistic IoT Networks
Published 2024-11-01“…Simulation experiments using the ONE simulator show that CATR is superior to the Epidemic protocol, the so-called beta-based trust and reputation evaluation system (denoted BTRES), and the secure and privacy-preserving structure in opportunistic networks (denoted PPHB+), achieving an improvement of 22%, 15%, and 9% in terms of average latency, number of messages dropped, and average hop count, respectively, under varying number of nodes, buffer size, time to live, and message generation interval.…”
Get full text
Article -
32
-
33
On Channel Transforms to Enhance Reciprocity and Quantization in Physical-Layer Secret Key Generation
Published 2025-01-01“…Within the physical layer security (PLS) paradigm, the secret key generation (SKG) technique exploits the wireless channel’s randomness to generate symmetric secret keys for message encryption/decryption by legitimate communication nodes. …”
Get full text
Article -
34
Enhancing Stability and Efficiency in Mobile Ad Hoc Networks (MANETs): A Multicriteria Algorithm for Optimal Multipoint Relay Selection
Published 2024-11-01“…Consequently, the selection of paths and relay nodes that ensure stability, security, and extended network lifetimes is fundamental in designing routing protocols for MANETs. …”
Get full text
Article -
35
DGA domain detection and botnet prevention using Q-learning for POMDP
Published 2021-03-01Get full text
Article -
36
A Privacy-Preserving Reauthentication Scheme for Mobile Wireless Sensor Networks
Published 2013-05-01“…MWSN has advantages over static WSN in the aspect of better energy efficiency, improved coverage, and superior channel capacity. However, mobile nodes also bring some security problems. …”
Get full text
Article -
37
Realization of smart home key management mechanism based on ECC
Published 2017-06-01“…At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this basis,the key management mechanism based on ECC was designed to achieve the purpose of guaranteeing key security.The key management mechanism includes an ECC-based data encryption key management mechanism and an ECC-based digital signature key management mechanism.So that the wireless network node in the identity authentication,the key generation,distribution,storage,update and other aspects of the key security were guaranteed.Finally,the security,time-consuming and scalability of this mechanism were analyzed.The results show that the mechanism has strong security and expansibility,and it is superior to E-G key management scheme in time-consuming.…”
Get full text
Article -
38
Realization of smart home key management mechanism based on ECC
Published 2017-06-01“…At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this basis,the key management mechanism based on ECC was designed to achieve the purpose of guaranteeing key security.The key management mechanism includes an ECC-based data encryption key management mechanism and an ECC-based digital signature key management mechanism.So that the wireless network node in the identity authentication,the key generation,distribution,storage,update and other aspects of the key security were guaranteed.Finally,the security,time-consuming and scalability of this mechanism were analyzed.The results show that the mechanism has strong security and expansibility,and it is superior to E-G key management scheme in time-consuming.…”
Get full text
Article -
39
RMFKAN: Network Spammers Detection Method Based on Improved Graph Mamba
Published 2025-05-01Get full text
Article -
40
Conv1D-GRU-Self Attention: An Efficient Deep Learning Framework for Detecting Intrusions in Wireless Sensor Networks
Published 2025-07-01“…Wireless Sensor Networks (WSNs) consist of distributed sensor nodes that collect and transmit environmental data, often in resource-constrained and unsecured environments. …”
Get full text
Article