2021
DOI: 10.1007/s12652-021-02968-6
|View full text |Cite
|
Sign up to set email alerts
|

Trust-based lightweight security protocol for device to device multihop cellular communication (TLwS)

Abstract: This current study was conducted to establish a bolted connection experimental database on Malaysia woods. The effort of improving the retrofit guideline in designing the walldiaphragm connections of masonry buildings can be continuously done. Brittle failure verifications on the Meraka hardwood to verify the occurrence of row shear failure are presented in this paper. The hardwood species was selected due to its common use as structural rafters and joists in the construction of roof and floor diaphragms of ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

4
2

Authors

Journals

citations
Cited by 13 publications
(13 citation statements)
references
References 28 publications
0
13
0
Order By: Relevance
“…By taking few assumptions like identity can be shared publicly, communication channels are always secure, and some of the credentials can be sent without encryption, the timestamp cannot be modified, single hashing can resolve the integrity problem and cryptosystem is free of quantum brute force and password guessing attacks [12]- [15]. However, several researchers believed that if the above-mentioned assumptions are not carefully addressed, they can lead towards common MAC layer attacks [6], [16]- [18] For instance, an identity reveals attack can lead to theft of identity, which leads towards impersonation attack or man in the middle attack.…”
Section: A Motivationmentioning
confidence: 99%
See 3 more Smart Citations
“…By taking few assumptions like identity can be shared publicly, communication channels are always secure, and some of the credentials can be sent without encryption, the timestamp cannot be modified, single hashing can resolve the integrity problem and cryptosystem is free of quantum brute force and password guessing attacks [12]- [15]. However, several researchers believed that if the above-mentioned assumptions are not carefully addressed, they can lead towards common MAC layer attacks [6], [16]- [18] For instance, an identity reveals attack can lead to theft of identity, which leads towards impersonation attack or man in the middle attack.…”
Section: A Motivationmentioning
confidence: 99%
“…Hence, the developed solution must consider a low computation device. Owing to this issue, many of the proposed solutions may be vulnerable to new era attacks [6]. Numerous techniques and approaches focused on secure data transfer, some others focused on authentication and key agreements.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In the current era, two-level or multilevel security is getting a lot of attention where multiple factors are considered for implementing security. In this way, security can be ensured to mitigate attacks caused by human carelessness, lack of awareness, and other bot attacks to protect sensitive data from possible security attacks [1][2][3][4][5][6] like distributed denial of service (DDoS) attacks [7][8][9][10] as the first line of defense. Furthermore, information security is big factor to implement internet of things (IoT) for smart cities [11][12][13][14][15][16][17][18][19] using software-defined networking [SDN] [20][21][22][23][24][25][26], named data networking (NDN) [27][28][29] and cloud computing network [30] with voice over IP (VoIP) [31][32][33][34] fiber optic [35][36][37], worldwide interoperability for microwave access (WiMAX) [37][38][39][40], swarm intelligence (SI) [41], artificial intelligence (AI), machine learning (ML) [42], deep learning (DL)…”
Section: Introductionmentioning
confidence: 99%