![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations
Vehicular ad hoc networks (VANET) facilitate vehicle to everything (V2X) communication between vehicles and road side units (RSU) to exchange safety and alert messages required for the successful implementatio...
-
Article
Analysis of crypto module in RIOT OS using Frama-C
With the growing advances in Internet of Things (IoT) technology, it has become an indispensable part of many areas like home automation, industries, medical equipment, etc. Thus, the security of the IoT hardw...
-
Article
Federated learning analysis for vehicular traffic flow prediction: evaluation of learning algorithms and aggregation approaches
The increasing development and implementation of Intelligent Transportation System have led to a growing focus on traffic flow prediction. To make these predictions, a large amount of historical and real-time ...
-
Chapter and Conference Paper
Feature Selection-Based Evaluation for Network Intrusion Detection System with Machine Learning Methods on CICIDS2017
Network attacks endanger the privacy and security of information. As a consequence of this, an effective mechanism is required for identifying network attacks. In this study, we show NIDS to increase classific...
-
Chapter and Conference Paper
Addressing DIO Suppression Attack in RPL based IoT Networks
The Internet of Things (IoT) has brought a revolution in technology in the last decade. IoT is susceptible to numerous internal routing attacks because of the characteristics of the sensors used in IoT network...
-
Article
Integration of Blockchain in VANET Using gRPC for Privacy Preservation of Vehicles
Vehicular ad hoc network (VANET) is a mobile network comprising vehicles, roadside units, and related infrastructure that enables inter-node communication to manage traffic and enhance road safety. Despite its...
-
Chapter and Conference Paper
Performance Assessment of Routing Protocols in Cognitive Radio Vehicular Ad Hoc Networks
Cognitive radio technology is an inventive method to solve spectrum scarcity problems in wireless networks. Growing interest of cognitive radio (CR) technology in vehicular communication systems has led CR-ena...
-
Article
Investigating the performance of a vehicular communication system based on visible light communication (VLC)
The use of visible light for vehicle-to-vehicle (V2V) communication is intrinsically suited. This work uses the NS3.25 simulator to develop and simulate a V2V communication system based on visible light commun...
-
Chapter and Conference Paper
Analysis of Hatchetman Attack in RPL Based IoT Networks
Low power and lossy networks (LLN) are flourishing as an integral part of communication infrastructure, particularly for growing Internet of Things (IoT) applications. RPL-based LLNs are vulnerable and unprote...
-
Chapter and Conference Paper
Performance Evaluation of Image-Based Diseased Leaf Identification Model Using CNN and GA
India is an agricultural country and plays an important role in agriculture due to rapid population growth and increased demand for food production. Due to growing population, weather shifts and to make more p...
-
Article
LICCA: a lightweight image cipher using 3-D cellular automata
The rapid rise of Internet of Technology (IoT) applications in the twenty-first century is characterized by the frequent transmission of sensitive multimedia data. Such transmissions are vulnerable to security...
-
Chapter and Conference Paper
Investigation of SNR in VLC-Based Intelligent Transportation System Under Environmental Disturbances
Various forms of wireless communications technologies have been proposed for intelligent transportation systems (ITSs). Recent events have illustrated that visible light communication (VLC) can play a signific...
-
Chapter and Conference Paper
Hybrid Genetic Algorithm: Traveling Salesman Problem
A genetic algorithm has three main operators namely selection, crossover and mutation. Each operator has various sub operators. Selection of sub operator that can be applied on particular problem is difficult...
-
Chapter and Conference Paper
Performance Assessment of Thirteen Crossover Operators Using GA
Performance of genetic algorithms depends on evolutionary operators, i.e., selection, crossover, and mutation, in general, and on the type of crossover operators, in particular. With constant research going on...
-
Chapter and Conference Paper
Real-Time VANET Applications Using Fog Computing
The main objective of vehicular ad hoc networks (VANETs) is to improve driver safety and traffic efficiency. Most of VANET applications are based on periodic exchange of safety messages between nearby vehicles...
-
Chapter and Conference Paper
Cuckoo Search Strategies for Solving Combinatorial Problems (Solving Substitution Cipher: An Investigation)
Approximate algorithms have been well studied in order to solve combinatorial problems. This paper addresses cryptanalysis of the substitution cipher which is an interesting combinatorial problem. For this pur...
-
Article
Attack models and infrastructure supported detection mechanisms for position forging attacks in vehicular ad hoc networks
Vehicular ad hoc networks (VANETs) are vulnerable to message forging attacks, where an attacker creates a new message or replays/modifies an existing message. Forging of message can be carried out by attacker ...
-
Chapter and Conference Paper
Vimprint: Exploring Alternative Learning through Low-End Mobiles
The Internet today provides a plethora of applications to assist anyone wanting to learn a new subject, language or a concept. Resources available include dictionaries, translation engines, downloadable e-book...
-
Chapter and Conference Paper
Visual Conversational Interfaces to Empower Low-Literacy Users
Mobile phones have come a long way from being plain voice calling devices to becoming multipurpose handy tools powered by ever increasing new applications available on-the-go. For many, the mobile phone of tod...
-
Chapter
Trust Establishment Techniques in VANET
Establishment of trust is amongst the most critical aspects of any system’s security. For any network, trust refers to a set of relationships amongst the entities participating in the network operations. Trust...