نتایج جستجو برای: spectrum sensing data falsification attack
تعداد نتایج: 2736404 فیلتر نتایج به سال:
A wireless sensor network is a collaborative network in which nodes perform their sensing task in one hand, and function as relay for transferring the data of other nodes on the other hand if necessary. It consists of many inexpensive wireless nodes, each having sensing capability with some computational and communication power. As sensor networks are coming to be of wide-spread deployment, sec...
Encrypted control systems are secure methods that use the cryptographic properties of a specific homomorphic encryption scheme. This study proposes cyberattack-detectable encrypted system and validates its effectiveness using proportional integration derivative (PID) position-control for an industrial motor. The proposed uses keyed-homomorphic public-key scheme real-time detection cyberattacks,...
The natural acoustic system used by marine mammals and the artificial sonar system used by humans coexist in the underwater cognitive sonar communication networks (CSCN). They share the spectrum when they are in the same waters. The CSCN detects the natural acoustic signal depending on cooperative spectrum sensing of sonar nodes. In order to improve spectrum sensing performance of CSCN, the opt...
Detection of sink Hole Attack in Wireless Sensor Network using Advanced Secure AODV Routing Protocol
wireless sensor network has been used for data sensing and collection at a single point for decision making process. Attack comprising in WSN produced various issues in data transmission and data management. Sinkhole attack is a compromised attack in WSN that compromised nodes that advertises a shortest path for data transmission. In this paper a new approach has been purposed for detection of ...
Pressurized pipe networks used for fresh-water distribution can take advantage of recent advances in sensing technologies and data-interpretation to evaluate their performance. In this paper, a leak-detection and a sensor placement methodology are proposed based on leak-scenario falsification. The approach includes modeling and measurement uncertainties during the leak detection process. The pe...
Energy efficacious-cooperative spectrum sensing (EE-CSS) protocol based on Trust and Reputation Management (TRM) unit is proposed. This protocol reduces the number of sensing reports exchanged between secondary users and its base station. Trust and Reputation Management unit was proposed to alleviate the malicious behaviour in Cognitive Radio Network (CRN) and to ensure there is no link disconn...
The development of effective remote sensing data authentication techniques is of remarkably growing interest. Several existing authentication algorithms have been reported as insecure, yielding inaccurate attack localization, and vulnerable to various attacks, especially the blind pattern matching attack. with insufficient security. In this paper, we propose a new pseudorandomly-shaped polygons...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید