Secure-Rpl: Approach To Prevent Resource-Based Attacks In Wireless Sensor Networks Using Balanced Clustering
Internet of Things (IoT) is an evolving computing technology that enables an interconnection amongst physical devices, which offers many advantages, such as easy access to information, cost effectiveness, automation, efficient resource utilisation, reduced human effort and high productivity, all of...
| Main Author: | Alhamead Al Absi, Basim Ahmad Abed |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/52240/ |
| Abstract | Abstract here |
Similar Items
Passive Rule-Based Approach To Detect Sinkhole Attack In 6lowpan Rpl Based Internet Of Things Networks
by: Subh, Al Sarawi Shadi Mustafa
Published: (2024)
by: Subh, Al Sarawi Shadi Mustafa
Published: (2024)
A new sinkhole attack detection algorithm for RPL in wireless sensor networks (WSN)
by: Ali, Mohammed Qasim
Published: (2019)
by: Ali, Mohammed Qasim
Published: (2019)
An Improved Secure Router Discovery Mechanism To Prevent Fake Ra Attack In Link Local Ipv6 Network
by: C. Arjuman, Navaneethan
Published: (2021)
by: C. Arjuman, Navaneethan
Published: (2021)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014)
by: Shaukat, Haafizah Rameeza
Published: (2014)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
by: Malekzadeh, Mina
Published: (2011)
by: Malekzadeh, Mina
Published: (2011)
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
Chained Identity Attestation (CIA) method in preventing node impersonation attack in wireless sensor network / Norhaflyza Marbukhari
by: Marbukhari, Norhaflyza
Published: (2018)
by: Marbukhari, Norhaflyza
Published: (2018)
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
A secure rfid model for denial of service attack prevention
by: Farzam Abbasaghababazadeh
Published: (2025)
by: Farzam Abbasaghababazadeh
Published: (2025)
A secure RFID model for denial of service attack prevention
by: Farzam Abbasaghababazadeh
Published: (2025)
by: Farzam Abbasaghababazadeh
Published: (2025)
A trust model anomaly detection of RPL attacks in WSN-based IOT / Zainab Ebrahim Qamber Ghuloom Abdulla Alansari
by: Zainab Ebrahim Qamber Ghuloom , Abdulla Alansari
Published: (2023)
by: Zainab Ebrahim Qamber Ghuloom , Abdulla Alansari
Published: (2023)
Energy efficient cluster-head election scheme for wireless sensor network based on fuzzy load balancing
by: Nancy, anak Bundan
Published: (2014)
by: Nancy, anak Bundan
Published: (2014)
Secure Trust-Based Algorithm using Blockchain Technology to Prevent Attacks in VANET
by: Kuhanraj, Balan
Published: (2020)
by: Kuhanraj, Balan
Published: (2020)
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
by: Al Ogaili, Riyadh Rahef Nuiaa
Published: (2023)
by: Al Ogaili, Riyadh Rahef Nuiaa
Published: (2023)
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
HTTPS approach to resist MITM attack in secure SMS
by: Muhammad Murad Khan
Published: (2025)
by: Muhammad Murad Khan
Published: (2025)
Modified radio model for clustering wireless sensor network
by: Habeeb, Bello Salau
Published: (2024)
by: Habeeb, Bello Salau
Published: (2024)
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
by: Hintaw, Ahmed Jameel
Published: (2023)
by: Hintaw, Ahmed Jameel
Published: (2023)
Energy efficient cluster head distribution in wireless sensor networks
by: Siew, Zhan Wei
Published: (2013)
by: Siew, Zhan Wei
Published: (2013)
An efficient dynamic cluster-based wireless sensor network architecture
by: Asim Zeb
Published: (2025)
by: Asim Zeb
Published: (2025)
A neighbor's trust based model for prevention of black hole attack in wireless mobile ad hoc networks
by: Tanya Koohpayeh Araghi
Published: (2025)
by: Tanya Koohpayeh Araghi
Published: (2025)
Imperialist competitive algorithm for energy-efficient clustering in wireless sensor network
by: Nur Anisah Salehuddin
Published: (2025)
by: Nur Anisah Salehuddin
Published: (2025)
Centralized clustering algorithm to enhance the energy consumption in wireless sensor networks
by: Mustafa Fuad Ismail (P83633)
Published: (2023)
by: Mustafa Fuad Ismail (P83633)
Published: (2023)
Enhanced Trust-nd Protocol To Prevent Temporal Denial-of-service Vulnerabilities On Ipv6 Link-local Network
by: Hasbullah, Iznan Husainy
Published: (2023)
by: Hasbullah, Iznan Husainy
Published: (2023)
Secure geographic forwarding protocols for wireless sensor networks
by: Adnan, Ali Idarous
Published: (2017)
by: Adnan, Ali Idarous
Published: (2017)
Secure data aggregation protocol for wireless sensor network
by: Hamidreza Ghafghazi
Published: (2025)
by: Hamidreza Ghafghazi
Published: (2025)
Design and evaluation of routing metric for RPL routing protocol in WSN based on queue backlogs
by: Awad, Abdallah M. A.
Published: (2024)
by: Awad, Abdallah M. A.
Published: (2024)
Energy efficient in cluster head and relay node selection for wireless sensor networks
by: Azamuddin, Ab. Rahman
Published: (2021)
by: Azamuddin, Ab. Rahman
Published: (2021)
Enhancement of an intelligent energy efficient clustering routing protocol for wireless sensor network
by: Salami, Abdulazeez Olufemi
Published: (2024)
by: Salami, Abdulazeez Olufemi
Published: (2024)
An improved energy-efficient clustering protocol to prolong the wireless sensor network lifetime
by: Alhmood, Ali Abdul-Hussian Hassan
Published: (2021)
by: Alhmood, Ali Abdul-Hussian Hassan
Published: (2021)
A situation assessment and prediction mechanism for network security situation awareness
by: Leau, Yu Beng
Published: (2016)
by: Leau, Yu Beng
Published: (2016)
A clustering approach to adaptively improve energy efficiency and load balancing in WSNs
by: Haneen, Ahmed Hasan
Published: (2019)
by: Haneen, Ahmed Hasan
Published: (2019)
An adaptive clustering approach to dynamic load balancing and energy consumption of nodes in WSN
by: Ako, Ahmed Swara Abbas
Published: (2019)
by: Ako, Ahmed Swara Abbas
Published: (2019)
Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol
by: Jaisan S M, Ashish
Published: (2024)
by: Jaisan S M, Ashish
Published: (2024)
Efficient and secured compression and steganography technique in wireless sensor network
by: Tuama, Ammar Yaseen
Published: (2016)
by: Tuama, Ammar Yaseen
Published: (2016)
Development of security in wireless sensor network using IPv6
by: Jayapal, Vikneswary
Published: (2009)
by: Jayapal, Vikneswary
Published: (2009)
Optimal wireless sensor network secure routing for pervasive computing
by: Alkalbani, Abdullah bin Said bin Nasser
Published: (2024)
by: Alkalbani, Abdullah bin Said bin Nasser
Published: (2024)
Hybrid metaheuristic method for clustering in wireless sensor networks / Bryan Raj Peter Jabaraj
by: Bryan Raj , Peter Jabaraj
Published: (2023)
by: Bryan Raj , Peter Jabaraj
Published: (2023)
Similar Items
-
Passive Rule-Based Approach To Detect Sinkhole Attack In 6lowpan Rpl Based Internet Of Things Networks
by: Subh, Al Sarawi Shadi Mustafa
Published: (2024) -
A new sinkhole attack detection algorithm for RPL in wireless sensor networks (WSN)
by: Ali, Mohammed Qasim
Published: (2019) -
An Improved Secure Router Discovery Mechanism To Prevent Fake Ra Attack In Link Local Ipv6 Network
by: C. Arjuman, Navaneethan
Published: (2021) -
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016) -
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014)
