Search
Search Results
-
Forwarding Neighbor Based Sink Reputed Trust Based Intrusion Detection System to Mitigate Selective Forwarding Attack in RPL for IoT Networks
The physical world and information world communicate giving birth to the Internet of Things firstly coined by Kevin Ashton in 1999. But actual growth...
-
A multi-attribute-based data forwarding scheme for delay tolerant networks
Routing in Delay Tolerant Networks (DTNs) is a challenging problem due to the absence of an end-to-end path between source-destination pairs of...
-
Simplifying Forwarding Data Plane Operations with XOR-Based Source Routing
We propose a theoretical analysis of a novel source routing scheme called XSR. XSR uses linear encoding operation to both (1) build the path labels...
-
Hop-by-Hop Verification Mechanism of Packet Forwarding Path Oriented to Programmable Data Plane
Attacks against the forwarding path could deviate data packets from the predefined route to achieve ulterior purposes, which has posed a serious... -
On efficient interest forwarding in named data networks over IEEE 802.15.4: a comprehensive performance evaluation
This paper addresses the limitations of existing interest forwarding strategies in Named Data Networks (NDN) over Low-power and Lossy Networks...
-
IDTracS: an Interest-Data-flow tracking-based forwarding scheme for vehicular named data networks
The vehicular named data networking (VNDN) is gaining more attention as a future vehicular networking (VN) model. The VNDN's fundamental principles...
-
Packet Forwarding with Swaps
We consider packet forwarding in the adversarial queueing theory (AQT) model introduced by Borodin et al. In this context, a series of recent works... -
DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN
The RPL routing protocol is susceptible to Selective Forwarding Attack (SFA), wherein malicious nodes selectively forward certain packets while...
-
High Precision Latency Forwarding for Wide Area Networks Through Intelligent In-Packet Header Processing (gLBF)
This paper presents guaranteed Latency Based Forwarding (gLBF), a solution that allows for the delivery of packets with end-to-end latency guarantees...
-
A Chained Forwarding Mechanism for Large Messages
The proliferation of wide-bandwidth network services, e.g. high-definition video (HD video), has made the fragmentation mechanism necessary. However,... -
Fabric Forwarding (and Troubleshooting)
It doesn’t matter if you are dealing with a traditional network or software defined ACI. One of the important aspects of network operation is... -
FSCN: a novel forwarding method based on Shannon entropy and COPRAS decision process in named data networking
The appropriate output interface (forwarding) has recently emerged as a key challenge affecting the performance of Named Data Networking (NDN)....
-
Low-cost crossed probing path planning for network failure localization
Links inevitably fail in expanding networks, leading to user-perceived service interruptions. To localize link failures quickly and accurately is...
-
SPOF-NDN: A POF-Based NDN Forwarding Scheme
Named data networking (NDN) is an instance of information-centric networking (ICN) architecture that delivers data based on the data’s name. NDN uses... -
Optimal Path Selection in Vehicular Adhoc Network Using Hybrid Optimization
Businesses, academics, and professionals are concentrating on enhancing safety as a consequence of the swift development of wireless technology. The...
-
PDLB: Path Diversity-aware Load Balancing with adaptive granularity in data center networks
Modern data center topologies often take the form of a multi-rooted tree with rich parallel paths to provide high bandwidth. However, various path...
-
Scheduling on-demand charging request in wireless rechargeable sensor network with fruit fly optimization-based path selection
Wireless Rechargeable Sensor Network (WRSN) is a promising solution to prolong the lifetime of Wireless Sensor Networks (WSNs). In WRSN, Mobile...
-
Forward-Secure Encryption with Fast Forwarding
Forward-secure encryption (FSE) allows communicating parties to refresh their keys across epochs, in a way that compromising the current secret key... -
OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things
The Internet of Things represents a rapidly evolving networking paradigm that brings numerous benefits through its diverse applications. Advances in...
-
Generous or Selfish? Weighing Transaction Forwarding Against Malicious Attacks in Payment Channel Networks
Scalability has long been a major challenge of cryptocurrency systems, which is mainly caused by the delay in reaching consensus when processing...