Showing 21 - 40 results of 67 for search 'superior node. Security', query time: 0.11s Refine Results
  1. 21

    Secrecy Capacity and Efficiency Outage Analysis of Cooperative PHY-Secure Wireless Systems and Secrecy Capacity-Based RIS Design by Tarun Jain, Sainath Bitragunta, Ashutosh Bhatia

    Published 2025-01-01
    “…In this work, we consider a four-node, dual hop, eavesdropper-aware cooperative PHY-security model. …”
    Get full text
    Article
  2. 22

    SC-Route: A Scalable Cross-Layer Secure Routing Method for Multi-Hop Inter-Domain Wireless Networks by Yanbing Li, Yang Zhu, Shangpeng Wang

    Published 2025-05-01
    “…Multi-hop inter-domain wireless networks play a vital role in future heterogeneous communication systems by improving data transmission efficiency and security assurance. Despite the advances in secure routing techniques in areas such as node authentication and encryption, they still suffer from the shortcomings of frequent key updates, high computational overhead, and poor adaptability to large-scale dynamic topologies. …”
    Get full text
    Article
  3. 23

    New Ethereum-based distributed PKI with a reward-and-punishment mechanism by Chong-Gee Koa, Swee-Huay Heng, Ji-Jian Chin

    Published 2025-03-01
    “…Comparative simulations between ETHERST version 2.0 and ETHERST version 3.0 reveal the superior performance of the latter in trustworthiness measurement and ensure the higher security of a virtual community. …”
    Get full text
    Article
  4. 24

    Enhancing security and efficiency in Mobile Ad Hoc Networks using a hybrid deep learning model for flooding attack detection by Pramodh Krishna D., E. Sandhya, Khaja Shareef Sk, Srihari Varma Mantena, Venkata Subbaiah Desanamukula, Ch Koteswararao, Srinivasa Rao Vemula, Maruthi Vemula

    Published 2025-01-01
    “…These advancements underline the model’s superiority in detecting malicious nodes, conserving energy, and ensuring reliable network performance. …”
    Get full text
    Article
  5. 25

    PSLDV-Hop: a robust localization algorithm for WSN using PSO and refinement process by Bhupinder Kaur, Deepak Prashar, Arfat Ahmad Khan, Seifedine Kadry, Jungeun Kim

    Published 2025-07-01
    “…By utilizing an improved iterative evolution algorithm, the PSLDV-Hop algorithm reduces localization errors by achieving a higher degree of accuracy in node localization. Simulation results demonstrate their superiority over other classical improved algorithms and the original distance vector hop. …”
    Get full text
    Article
  6. 26

    Joint beamforming and cooperative jamming for secure transmission in multi-antenna decode-and-forward relaying sensor networks: A greedy switching strategy by Zhi Lin, Li Lou, Bin Gao, Fenggang Sun, Yuzhen Huang, Maoqiang Yang, Mingfang Ni

    Published 2017-05-01
    “…In wireless sensor networks, sensor nodes are deployed to collect data and deliver the sensed information to a base station in a wireless manner. …”
    Get full text
    Article
  7. 27

    Secure Cooperative Dual-RIS-Aided V2V Communication: An Evolutionary Transformer–GRU Framework for Secrecy Rate Maximization in Vehicular Networks by Elnaz Bashir, Francisco Hernando-Gallego, Diego Martín, Farzaneh Shoushtari

    Published 2025-07-01
    “…In this paper, we investigate the problem of secrecy rate maximization in a cooperative dual-RIS-aided V2V communication network, where two cascaded RISs are deployed to collaboratively assist with secure data transmission between mobile vehicular nodes in the presence of eavesdroppers. …”
    Get full text
    Article
  8. 28

    Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA by Abdullah Sevin, Abdu Ahmed Osman Mohammed

    Published 2024-12-01
    “…Blockchain has several unique features: data integrity, security, privacy, and immutability. For this reason, it is considered one of the most promising new technologies for a wide range of applications. …”
    Get full text
    Article
  9. 29

    A comprehensive decision assessment for trust evaluation in wireless sensor networks by Chakkarapani Sumathi Thilagasree, Thippan Jayakumar, Joseph Raj Vikilal Joice Brainy, Subramaniam Pragathi, Kang Daekook

    Published 2025-01-01
    “…This study endeavors to tackle the pressing issue of network security within Wireless Sensor Networks (WSNs) through the introduction of an innovative integrated Pythagorean fuzzy-based method for evaluating network nodes. …”
    Get full text
    Article
  10. 30

    A Robust Authentication and Trust Detection With Privacy Preservation of Data for Fog Computing in VANET Using Adaptive Deep Neural Network by Jia Jia, Sathiya Sekar Kumarasamy, Kiran Sree Pokkuluri, K. Suresh Kumar, Thella Preethi Priyanka, Feng Wang

    Published 2024-01-01
    “…Trust detection and node authentication within fog computing for the Vehicle Ad-hoc Networks (VANETs) are used to determine whether the automobiles and other infrastructure elements including Roadside Units (RSUs) are valid and secure before permitting them to function on the system. …”
    Get full text
    Article
  11. 31

    Context-Aware Trust and Reputation Routing Protocol for Opportunistic IoT Networks by Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang, Han-Chieh Chao

    Published 2024-11-01
    “…Simulation experiments using the ONE simulator show that CATR is superior to the Epidemic protocol, the so-called beta-based trust and reputation evaluation system (denoted BTRES), and the secure and privacy-preserving structure in opportunistic networks (denoted PPHB+), achieving an improvement of 22%, 15%, and 9% in terms of average latency, number of messages dropped, and average hop count, respectively, under varying number of nodes, buffer size, time to live, and message generation interval.…”
    Get full text
    Article
  12. 32
  13. 33

    On Channel Transforms to Enhance Reciprocity and Quantization in Physical-Layer Secret Key Generation by Ghalib Hussain, Syed Junaid Nawaz, Shurjeel Wyne, Mohammad N. Patwary

    Published 2025-01-01
    “…Within the physical layer security (PLS) paradigm, the secret key generation (SKG) technique exploits the wireless channel’s randomness to generate symmetric secret keys for message encryption/decryption by legitimate communication nodes. …”
    Get full text
    Article
  14. 34

    Enhancing Stability and Efficiency in Mobile Ad Hoc Networks (MANETs): A Multicriteria Algorithm for Optimal Multipoint Relay Selection by Ayoub Abdellaoui, Yassine Himeur, Omar Alnaseri, Shadi Atalla, Wathiq Mansoor, Jamal Elmhamdi, Hussain Al-Ahmad

    Published 2024-11-01
    “…Consequently, the selection of paths and relay nodes that ensure stability, security, and extended network lifetimes is fundamental in designing routing protocols for MANETs. …”
    Get full text
    Article
  15. 35
  16. 36

    A Privacy-Preserving Reauthentication Scheme for Mobile Wireless Sensor Networks by Shunrong Jiang, Jiapeng Zhang, JingJun Miao, Conghua Zhou

    Published 2013-05-01
    “…MWSN has advantages over static WSN in the aspect of better energy efficiency, improved coverage, and superior channel capacity. However, mobile nodes also bring some security problems. …”
    Get full text
    Article
  17. 37

    Realization of smart home key management mechanism based on ECC by Wenbin CHENG, Jia LIU

    Published 2017-06-01
    “…At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this basis,the key management mechanism based on ECC was designed to achieve the purpose of guaranteeing key security.The key management mechanism includes an ECC-based data encryption key management mechanism and an ECC-based digital signature key management mechanism.So that the wireless network node in the identity authentication,the key generation,distribution,storage,update and other aspects of the key security were guaranteed.Finally,the security,time-consuming and scalability of this mechanism were analyzed.The results show that the mechanism has strong security and expansibility,and it is superior to E-G key management scheme in time-consuming.…”
    Get full text
    Article
  18. 38

    Realization of smart home key management mechanism based on ECC by Wenbin CHENG, Jia LIU

    Published 2017-06-01
    “…At present,the data encryption technology of smart home system uses symmetric encryption method,but there is a problem with key management in this way.To achieve the security of the key,the smart home system uses asymmetric encryption technology.On this basis,the key management mechanism based on ECC was designed to achieve the purpose of guaranteeing key security.The key management mechanism includes an ECC-based data encryption key management mechanism and an ECC-based digital signature key management mechanism.So that the wireless network node in the identity authentication,the key generation,distribution,storage,update and other aspects of the key security were guaranteed.Finally,the security,time-consuming and scalability of this mechanism were analyzed.The results show that the mechanism has strong security and expansibility,and it is superior to E-G key management scheme in time-consuming.…”
    Get full text
    Article
  19. 39
  20. 40

    Conv1D-GRU-Self Attention: An Efficient Deep Learning Framework for Detecting Intrusions in Wireless Sensor Networks by Kenan Honore Robacky Mbongo, Kanwal Ahmed, Orken Mamyrbayev, Guanghui Wang, Fang Zuo, Ainur Akhmediyarova, Nurzhan Mukazhanov, Assem Ayapbergenova

    Published 2025-07-01
    “…Wireless Sensor Networks (WSNs) consist of distributed sensor nodes that collect and transmit environmental data, often in resource-constrained and unsecured environments. …”
    Get full text
    Article