10,777 research outputs found

    Trust-Based Security Technique to Curb Cooperative Black Hole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3

    Get PDF
    The advent of mobile technology led to the emergence of Mobile Ad-hoc networks (MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and leave the network at will making the network topology dynamic. MANETs are prone to both passive and active security attacks. Blackhole is a denial of service attack under active attacks. Blackhole nodes work in collaboration forming cooperative black hole attacks. The attacks drop or redirecting data packets on transit. Cooperative blackhole attacks are dangerous in operations where communication is critica

    ICT Based HIL Validation of Voltage Control Coordination in Smart Grids Scenarios

    Get PDF
    This paper aims to validate the capability of renewable generation (ReGen) plants to provide online voltage control coordination ancillary service to the system operators in smart grids. Simulation studies about online coordination concepts from ReGen plants have already been identified in previous publications. However, here, the results are validated through a real-time Hardware-In-the-Loop framework using an exemplary benchmark grid area in Denmark as a base case that includes flexible renewable power plants providing voltage control functionality. The provision of voltage control support from ReGen plants is verified on a large-scale power system against the baseline scenario, considering the hierarchical industrial controller platforms used nowadays in power plants. Moreover, the verification of online voltage control support is carried out by taking into account a communication network as well as the associated data traffic patterns obtained from a real network. Based on the sets of recordings, guidelines and recommendations for practical implementation of the developed control algorithms for targeted ancillary service are made. This provides a deep insight for stakeholders, i.e., wind turbine and photo-voltaic system manufacturers and system operators, regarding the existing boundaries for current technologies and requirements for accommodating the new ancillary services in industrial application

    Smart handoff technique for internet of vehicles communication using dynamic edge-backup node

    Get PDF
    © 2020 The Authors. Published by MDPI. This is an open access article available under a Creative Commons licence. The published version can be accessed at the following link on the publisher’s website: https://doi.org/10.3390/electronics9030524A vehicular adhoc network (VANET) recently emerged in the the Internet of Vehicles (IoV); it involves the computational processing of moving vehicles. Nowadays, IoV has turned into an interesting field of research as vehicles can be equipped with processors, sensors, and communication devices. IoV gives rise to handoff, which involves changing the connection points during the online communication session. This presents a major challenge for which many standardized solutions are recommended. Although there are various proposed techniques and methods to support seamless handover procedure in IoV, there are still some open research issues, such as unavoidable packet loss rate and latency. On the other hand, the emerged concept of edge mobile computing has gained crucial attention by researchers that could help in reducing computational complexities and decreasing communication delay. Hence, this paper specifically studies the handoff challenges in cluster based handoff using new concept of dynamic edge-backup node. The outcomes are evaluated and contrasted with the network mobility method, our proposed technique, and other cluster-based technologies. The results show that coherence in communication during the handoff method can be upgraded, enhanced, and improved utilizing the proposed technique.Published onlin
    • …
    corecore