Search Results

Results (3)

Search Parameters:

Keyword: Routing attacks
Order results
Results per page
Open AccessArticle
11 Pages, 1,136 KB Download PDF

A Secure Trust Aware ACO-Based WSN Routing Protocol for IoT

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 95–105, 2022; DOI: 10.25046/aj070311
Abstract:

The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied architectures and resources to provide ubiquitous and desired services. The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 428 KB Download PDF

Taxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 25–31, 2022; DOI: 10.25046/aj070203
Abstract:

The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…

Read More
(This article belongs to Section Network Engineering (ENW))
Open AccessArticle
15 Pages, 1,373 KB Download PDF

Attacks classification and security mechanisms in Wireless Sensor Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 229–243, 2019; DOI: 10.25046/aj040630
Abstract:

This paper proposes a new classification model distinguishing four classes of attacks in Wireless Sensor Networks (WSNs) namely: attacks based on the protocol stack, on the capability of the attacker, on the attack impacts and on the attack target. Then, it presents and classifies the most known attacks in WSNs based the proposed model. Simulations…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026