FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks
Published 2023 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks
Authors
Keywords
-
Journal
IEEE Access
Volume 11, Issue -, Pages 4549-4573
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Online
2023-01-12
DOI
10.1109/access.2023.3235900
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Average Operation Time of Bundle Protocol in Delay/disruption-Tolerant Networks
- (2022) Lei Cao et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- Comprehensive literature review on delay tolerant network (DTN) framework for improving the efficiency of internet connection in rural regions of Malaysia
- (2022) Sundresan Perumal et al. International Journal of System Assurance Engineering and Management
- Enhanced UAV-aided vehicular delay tolerant network (VDTN) routing for urban environment using a bio-inspired approach
- (2022) Youcef Azzoug et al. Ad Hoc Networks
- Selfish Node Detection by Modularized Deep NMF Autoencoder Based Incentivized Reputation Scheme
- (2022) Rakhi Sharma et al. CYBERNETICS AND SYSTEMS
- Selfish node management in opportunistic mobile networks with improved social based watchdog and dynamic power AODV protocol
- (2022) Bismin V. Sherif et al. International Journal of Information Technology (Singapore)
- A Delay-Tolerant Network for Antarctica
- (2022) Adria Mallorqui et al. IEEE COMMUNICATIONS MAGAZINE
- An adaptive multiple spray-and-wait routing algorithm based on social circles in delay tolerant networks
- (2021) Libing Wu et al. Computer Networks
- Performance Evaluation of a Hash-Based Countermeasure against Fake Message Attacks in Sparse Mobile Ad Hoc Networks
- (2021) Yuki SHIMIZU et al. IEICE TRANSACTIONS ON COMMUNICATIONS
- A taxonomy on misbehaving nodes in delay tolerant networks
- (2018) Waqar Khalid et al. COMPUTERS & SECURITY
- Packet integrity defense mechanism in OppNets
- (2018) Asma'a Ahmad et al. COMPUTERS & SECURITY
- Detecting Flooding Attack and Accommodating Burst Traffic in Delay-Tolerant Networks
- (2018) Thi Ngoc Diep Pham et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Beacon trust management system and fake data detection in vehicular ad-hoc networks
- (2018) Muhammad Arshad et al. IET Intelligent Transport Systems
- Catabolism attack and Anabolism defense: A novel attack and traceback mechanism in Opportunistic Networks
- (2015) Majeed Alajeely et al. COMPUTER COMMUNICATIONS
- To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks
- (2012) Qinghua Li et al. IEEE Transactions on Dependable and Secure Computing
- Mitigating Routing Misbehavior in Disruption Tolerant Networks
- (2011) Qinghua Li et al. IEEE Transactions on Information Forensics and Security
- An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks
- (2011) Erman Ayday et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks
- (2009) Haojin Zhu et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started