Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    DERNNet: Dual Encoding Recurrent Neural Network Based Secure Optimal Routing in WSN

    A. Venkatesh1, S. Asha2,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1375-1392, 2023, DOI:10.32604/csse.2023.030944

    Abstract A Wireless Sensor Network (WSN) is constructed with numerous sensors over geographical regions. The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy. As sensor nodes are resource constrained in nature, novel techniques are essential to improve lifetime of nodes in WSN. Nodes energy is considered as an important resource for sensor node which are battery powered based. In WSN, energy is consumed mainly while data is being transferred among nodes in the network. Several research works are carried out focusing on preserving energy of nodes in the network and made network… More >

  • Open Access

    ARTICLE

    NDN Content Poisoning Mitigation Using Bird Swarm Optimization and Trust Value

    S. V. Vijaya Karthik*, J. Arputha Vijaya Selvi

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 833-847, 2023, DOI:10.32604/iasc.2023.025404

    Abstract Information-Centric Networking (ICN) is considered a viable strategy for regulating Internet consumption using the Internet’s underlying architecture. Although Named Data Networking (NDN) and its reference-based implementation, the NDN Forwarding Daemon (NFD), are the most established ICN solutions, their vulnerability to the Content Poisoning Attack (CPA) is regarded as a severe threat that might dramatically impact this architecture. Content Poisoning can significantly minimize the impact of NDN’s universal data caching. Using verification signatures to protect against content poisoning attacks may be impractical due to the associated costs and the volume of messages sent across the network, resulting in high computational costs.… More >

  • Open Access

    ARTICLE

    A Trust Value Sharing Scheme in Heterogeneous Identity Federation Topologies

    Ning Liu1, Fan Yang1, *, Xi Xiong1, 2, Yan Chang1, Shibin Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1559-1570, 2020, DOI:10.32604/cmc.2020.010562

    Abstract Recent developments in heterogeneous identity federation systems have heightened the need for the related trust management system. The trust management system evaluates, manages, and shares users’ trust values. The service provider (SP) members of the federation system rely on users’ trust values to determine which type and quality of service will be provided to the users. While identity federation systems have the potential to help federated users save time and energy and improve service experience, the benefits also come with significant privacy risks. So far, there has been little discussion about the privacy protection of users in heterogeneous identity federation… More >

Displaying 1-10 on page 1 of 3. Per Page