Search Results - "Manickam, Selvakumar"
-
1
Survey of Authentication and Privacy Schemes in Vehicular ad hoc Networks
Published in IEEE sensors journal (15-01-2021)“…Vehicular ad hoc networks (VANETs) have become increasingly common in recent years due to their critical role in the field of smart transportation by…”
Get full text
Journal Article -
2
COVID-19 Vehicle Based on an Efficient Mutual Authentication Scheme for 5G-Enabled Vehicular Fog Computing
Published in International journal of environmental research and public health (24-11-2022)“…The COVID-19 pandemic is currently having disastrous effects on every part of human life everywhere in the world. There have been terrible losses for the…”
Get full text
Journal Article -
3
ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing
Published in PloS one (23-06-2023)“…Fifth-generation (5G)-enabled vehicular fog computing technologies have always been at the forefront of innovation because they support smart transport like…”
Get full text
Journal Article -
4
Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation
Published in Symmetry (Basel) (01-08-2022)“…Mobile ad hoc networks (MANETs) are being used more and more in a variety of fields, including the environment, energy efficiency, smart transportation,…”
Get full text
Journal Article -
5
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
Published in Applied sciences (01-03-2023)“…The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network…”
Get full text
Journal Article -
6
A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking
Published in Sensors (Basel, Switzerland) (01-05-2023)“…Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability…”
Get full text
Journal Article -
7
A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks
Published in Sensors (Basel, Switzerland) (22-02-2022)“…Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication…”
Get full text
Journal Article -
8
L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system
Published in PloS one (27-10-2023)“…The role that vehicular fog computing based on the Fifth Generation (5G) can play in improving traffic management and motorist safety is growing quickly. The…”
Get full text
Journal Article -
9
HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN
Published in PloS one (08-02-2024)“…Software Defined Network (SDN) has alleviated traditional network limitations but faces a significant challenge due to the risk of Distributed Denial of…”
Get full text
Journal Article -
10
Unveiling the Metaverse: Exploring Emerging Trends, Multifaceted Perspectives, and Future Challenges
Published in IEEE access (01-01-2023)“…The metaverse is an expanding network of digital spaces that are gaining popularity in the realm of virtual environments. By utilizing digital representations…”
Get full text
Journal Article -
11
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
Published in Sensors (Basel, Switzerland) (08-12-2021)“…Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system…”
Get full text
Journal Article -
12
IoT empowered smart cybersecurity framework for intrusion detection in internet of drones
Published in Scientific reports (27-10-2023)“…The emergence of drone-based innovative cyber security solutions integrated with the Internet of Things (IoT) has revolutionized navigational technologies with…”
Get full text
Journal Article -
13
A Systematic Literature Review on Security of Vehicular Ad-hoc Network (VANET) based on VEINS Framework
Published in IEEE access (01-01-2023)“…Innovative framework on Vehicles in Network Simulation (VEINS) for Vehicular Ad-hoc Network (VANET) that use security aspect is mainly limited and dispersed…”
Get full text
Journal Article -
14
Dickson polynomial-based secure group authentication scheme for Internet of Things
Published in Scientific reports (28-02-2024)“…Internet of Things (IoT) paves the way for the modern smart industrial applications and cities. Trusted Authority acts as a sole control in monitoring and…”
Get full text
Journal Article -
15
Exploring the Potential of Metaverse Technology in Healthcare: Applications, Challenges, and Future Directions
Published in IEEE access (01-01-2023)“…In recent times, the emergence of the Metaverse has garnered worldwide attention as an innovative digital space that holds immense potential to provide a wide…”
Get full text
Journal Article -
16
CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks
Published in Sensors (Basel, Switzerland) (03-07-2022)“…The security and privacy concerns in vehicular communication are often faced with schemes depending on either elliptic curve (EC) or bilinear pair (BP)…”
Get full text
Journal Article -
17
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
Published in Applied sciences (01-03-2023)“…Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these…”
Get full text
Journal Article -
18
A Novel DDoS Mitigation Strategy in 5G-Based Vehicular Networks Using Chebyshev Polynomials
Published in Arabian journal for science and engineering (2011) (01-09-2024)“…In fifth-generation (5G)-based vehicular networks, vehicles share information about the road’s condition to make driving safer and alleviate traffic…”
Get full text
Journal Article -
19
MSR-DoS: Modular Square Root-based Scheme to Resist Denial of Service (DoS) Attacks in 5G-enabled Vehicular Networks
Published in IEEE access (2022)“…Traffic safety and efficiency are extremely significant in both private and public transportation. The fifth-generation (5G)-enabled vehicular networks works…”
Get full text
Journal Article -
20
Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing
Published in Sensors (Basel, Switzerland) (28-03-2023)“…Several researchers have proposed secure authentication techniques for addressing privacy and security concerns in the fifth-generation (5G)-enabled vehicle…”
Get full text
Journal Article