We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Forwarding Neighbor Based Sink Reputed Trust Based Intrusion Detection System to Mitigate Selective Forwarding Attack in RPL for IoT Networks

    The physical world and information world communicate giving birth to the Internet of Things firstly coined by Kevin Ashton in 1999. But actual growth...

    Bimal Patel, Jalpesh Vasa, Parth Shah in SN Computer Science
    Article 26 May 2023
  2. A multi-attribute-based data forwarding scheme for delay tolerant networks

    Routing in Delay Tolerant Networks (DTNs) is a challenging problem due to the absence of an end-to-end path between source-destination pairs of...

    Ali Abbas, Raza Hasan in The Journal of Supercomputing
    Article 24 October 2023
  3. Simplifying Forwarding Data Plane Operations with XOR-Based Source Routing

    We propose a theoretical analysis of a novel source routing scheme called XSR. XSR uses linear encoding operation to both (1) build the path labels...

    Jérôme Lacan, Emmanuel Lochin in Journal of Network and Systems Management
    Article 21 December 2023
  4. Hop-by-Hop Verification Mechanism of Packet Forwarding Path Oriented to Programmable Data Plane

    Attacks against the forwarding path could deviate data packets from the predefined route to achieve ulterior purposes, which has posed a serious...
    Junsan Zeng, Ying Liu, ... Zhihong Jiang in Emerging Networking Architecture and Technologies
    Conference paper 2023
  5. On efficient interest forwarding in named data networks over IEEE 802.15.4: a comprehensive performance evaluation

    This paper addresses the limitations of existing interest forwarding strategies in Named Data Networks (NDN) over Low-power and Lossy Networks...

    Adel Salah Ould Khaoua, Abdelmadjid Boukra, Fella Bey in Cluster Computing
    Article 06 April 2024
  6. IDTracS: an Interest-Data-flow tracking-based forwarding scheme for vehicular named data networks

    The vehicular named data networking (VNDN) is gaining more attention as a future vehicular networking (VN) model. The VNDN's fundamental principles...

    Hussein Al-Omaisi, Elankovan A. Sundararajan, ... Maha Abdelhaq in The Journal of Supercomputing
    Article 29 April 2023
  7. Packet Forwarding with Swaps

    We consider packet forwarding in the adversarial queueing theory (AQT) model introduced by Borodin et al. In this context, a series of recent works...
    Cameron Matsui, Will Rosenbaum in Structural Information and Communication Complexity
    Conference paper 2023
  8. DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN

    The RPL routing protocol is susceptible to Selective Forwarding Attack (SFA), wherein malicious nodes selectively forward certain packets while...

    V. R. Rajasekar, S. Rajkumar in Cluster Computing
    Article 07 June 2024
  9. High Precision Latency Forwarding for Wide Area Networks Through Intelligent In-Packet Header Processing (gLBF)

    This paper presents guaranteed Latency Based Forwarding (gLBF), a solution that allows for the delivery of packets with end-to-end latency guarantees...

    Toerless Eckert, Alexander Clemm, Stewart Bryant in Journal of Network and Systems Management
    Article 04 February 2023
  10. A Chained Forwarding Mechanism for Large Messages

    The proliferation of wide-bandwidth network services, e.g. high-definition video (HD video), has made the fragmentation mechanism necessary. However,...
    Jiaqi Lin, Tao Feng, ... Shanqing Jiang in Algorithms and Architectures for Parallel Processing
    Conference paper 2024
  11. Fabric Forwarding (and Troubleshooting)

    It doesn’t matter if you are dealing with a traditional network or software defined ACI. One of the important aspects of network operation is...
    Jan Janovic in Cisco ACI: Zero to Hero
    Chapter 2023
  12. FSCN: a novel forwarding method based on Shannon entropy and COPRAS decision process in named data networking

    The appropriate output interface (forwarding) has recently emerged as a key challenge affecting the performance of Named Data Networking (NDN)....

    Mohammad Soltani, Behrang Barekatain, ... Zahra Beheshti in The Journal of Supercomputing
    Article 17 April 2023
  13. Low-cost crossed probing path planning for network failure localization

    Links inevitably fail in expanding networks, leading to user-perceived service interruptions. To localize link failures quickly and accurately is...

    Hongyun Gao, Lai** Zhao, ... Keqiu Li in World Wide Web
    Article 03 October 2023
  14. SPOF-NDN: A POF-Based NDN Forwarding Scheme

    Named data networking (NDN) is an instance of information-centric networking (ICN) architecture that delivers data based on the data’s name. NDN uses...
    Wei Guo, Yu Zhang, Binxing Fang in Emerging Networking Architecture and Technologies
    Conference paper 2023
  15. Optimal Path Selection in Vehicular Adhoc Network Using Hybrid Optimization

    Businesses, academics, and professionals are concentrating on enhancing safety as a consequence of the swift development of wireless technology. The...

    Kotakonda Madhubabu, N. Snehalatha in Multimedia Tools and Applications
    Article 03 November 2023
  16. PDLB: Path Diversity-aware Load Balancing with adaptive granularity in data center networks

    Modern data center topologies often take the form of a multi-rooted tree with rich parallel paths to provide high bandwidth. However, various path...

    Weimin Gao, Jiawei Huang, ... Jianxin Wang in Journal of Cloud Computing
    Article Open access 07 December 2023
  17. Scheduling on-demand charging request in wireless rechargeable sensor network with fruit fly optimization-based path selection

    Wireless Rechargeable Sensor Network (WRSN) is a promising solution to prolong the lifetime of Wireless Sensor Networks (WSNs). In WRSN, Mobile...

    T. Siron Anita Susan, Nithya Balasubramanian in International Journal of Information Technology
    Article 10 June 2022
  18. Forward-Secure Encryption with Fast Forwarding

    Forward-secure encryption (FSE) allows communicating parties to refresh their keys across epochs, in a way that compromising the current secret key...
    Yevgeniy Dodis, Daniel Jost, Harish Karthikeyan in Theory of Cryptography
    Conference paper 2022
  19. OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things

    The Internet of Things represents a rapidly evolving networking paradigm that brings numerous benefits through its diverse applications. Advances in...

    Taief Alaa Al-Amiedy, Mohammed Anbar, Bahari Belaton in Cluster Computing
    Article 08 June 2024
  20. Generous or Selfish? Weighing Transaction Forwarding Against Malicious Attacks in Payment Channel Networks

    Scalability has long been a major challenge of cryptocurrency systems, which is mainly caused by the delay in reaching consensus when processing...

    Yi Qin, Qin Hu, ... **u-Zhen Cheng in Journal of Computer Science and Technology
    Article 30 July 2022
Did you find what you were looking for? Share feedback.