Academic literature on the topic 'Critical packet forwarding'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Critical packet forwarding.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Critical packet forwarding"

1

Wu, Ping, Chao-Wen Chang, Ying-Ying Ma, and Zhi-Bin Zuo. "Constant-Size Credential-Based Packet Forwarding Verification in SDN." Security and Communication Networks 2022 (October 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/2270627.

Full text
Abstract:
The emerging software-defined networking (SDN) technology lacks tools to proactively ensure that policies will be followed or to inspect the behavior of the network. The network is vulnerable to sophisticated attacks against packets, such as alteration, injection, dropping, and hijacking attacks. Accurate and efficient network packet forwarding verification is a critical issue to ensure the correctness of packet forwarding when confronting with malicious attacks, while most of the existing packet forwarding verification solutions were implemented by inserting linear-scale cryptographic tags th
APA, Harvard, Vancouver, ISO, and other styles
2

Khan, Sajjad Ahmad, and Huhnkuk Lim. "Novel Fuzzy Logic Scheme for Push-Based Critical Data Broadcast Mitigation in VNDN." Sensors 22, no. 20 (2022): 8078. http://dx.doi.org/10.3390/s22208078.

Full text
Abstract:
Vehicular Named Data Networking (VNDN) is one of the potential and future networking architectures that allow Connected and Autonomous Vehicles (CAV) to exchange data by simply disseminating the content over the network. VNDN only supports a pull-based data forwarding model, where the content information is forwarded upon request. However, in critical situations, it is essential to design a push-based data forwarding model in order to broadcast the critical data packets without any requests. One of the challenges of push-based data forwarding in VNDN is the broadcasting effect, which occurs wh
APA, Harvard, Vancouver, ISO, and other styles
3

Diao, Wenlan, Jianping An, Tong Li, Yu Zhang, and Zhoujie Liu. "Lossless and High-Throughput Congestion Control in Satellite-Based Cloud Platforms." Electronics 14, no. 6 (2025): 1206. https://doi.org/10.3390/electronics14061206.

Full text
Abstract:
Low Earth Orbit (LEO) satellite networks are promising for satellite-based cloud platforms. Due to frequent link switching and long transmission distances in LEO satellite networks, applying the TCP/IP architecture introduces challenges such as packet loss and significant transmission delays. These issues can trigger excessive retransmissions, leading to link congestion and increased data acquisition delay. Deploying Named Data Networking (NDN) with connectionless communication and link-switching tolerance can help address these problems. However, the existing congestion control methods in NDN
APA, Harvard, Vancouver, ISO, and other styles
4

B., Manickavasagam, Amutha B., and Priyanka S. "Optimal packet routing for wireless body area network using software defined network to handle medical emergency." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (2020): 427–37. https://doi.org/10.11591/ijece.v10i1.pp427-437.

Full text
Abstract:
The packet forwarding node selection is one of the main constraints in the Software Defined Network (SDN). To improve the network performance, the SDN controller has to choose the shortest and optimized path between source and destination in routine and emergency packet transmission. In e-health service, information of the emergency patient has to be transferred immediately to remote hospitals or doctors by using efficient packet routing approach in Wireless Body Area Network (WBAN). In WBAN, to improve the packet transmission, the optimal packet routing policy developed based on packets prior
APA, Harvard, Vancouver, ISO, and other styles
5

Sravanthi, T., K. Ram Mohan Rao, and D. Sandhya Rani. "Distance Energy-Efficient Soft Computing Model for Data Forwarding in Healthcare Sensor Network." Journal of Sensors, IoT & Health Sciences 1, no. 1 (2023): 1–14. http://dx.doi.org/10.69996/jsihs.2023001.

Full text
Abstract:
Data forwarding is a crucial process in computer networking and telecommunications. It involves the transmission of data packets from a source to a destination within a network. The forwarding process is fundamental for enabling communication between devices on different segments of a network and plays a vital role in maintaining the overall performance and reliability of the network infrastructure. This paper presents the development and evaluation of the Threshold Congestion Data Forwarding Soft Computing (TCDF-SC) algorithm, designed for healthcare sensor networks. The algorithm combines th
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Ying, and Guo Rui Li. "Research on Selective Forwarding Attack Detection Scheme in Wireless Sensor Networks." Advanced Materials Research 433-440 (January 2012): 5298–302. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.5298.

Full text
Abstract:
Selective forwarding attacks in wireless sensor networks may corrupt some mission critical applications such as military surveillance and critical facilities monitoring. They are very difficult to be detected and distinguished from normal packet drops in wireless sensor networks. We propose an improved sequential mesh test based detection scheme in this paper. The scheme extracts a small quantity of samples to run the test, instead of regulating the total times of test in advance. We show through experiments that our scheme can provide higher detection accurate rate and lower false alarm rate
APA, Harvard, Vancouver, ISO, and other styles
7

Zheng, Ling, Guodong Wei, Keyao Zhang, and Hongyun Chu. "Traffic Classification and Packet Scheduling Strategy with Deadline Constraints for Input-Queued Switches in Time-Sensitive Networking." Electronics 13, no. 3 (2024): 629. http://dx.doi.org/10.3390/electronics13030629.

Full text
Abstract:
Deterministic transmission technology is a core key technology that supports deterministic real-time transmission requirements for industrial control in Time-Sensitive Networking (TSN). It requires each network node to have a deterministic forwarding delay to ensure the real-time end-to-end transmission of critical traffic streams. Therefore, when forwarding data frames, the switch nodes must consider the time-limited requirements of the traffic. In the input-queued switch system, an algorithm for clock-synchronized deterministic network traffic classification scheduling (CSDN-TCS) is proposed
APA, Harvard, Vancouver, ISO, and other styles
8

Al-Khalidi, Mohammed, Rabab Al-Zaidi, and Mohammad Hammoudeh. "Network Mobility Management Challenges, Directions, and Solutions: An Architectural Perspective." Electronics 11, no. 17 (2022): 2696. http://dx.doi.org/10.3390/electronics11172696.

Full text
Abstract:
Efficient mobility management solutions are essential to provide users with seamless connectivity and session continuity during movement. However, user mobility was not envisaged as one of the early Internet’s use cases due to the early adoption of destination based routing and the assumption that end-nodes are static. This has become a critical hinder for providing efficient mobility support. This paper presents the challenges, drivers, and solutions that aim to overcome the drawbacks of current mobility management approaches. Furthermore, it introduces a promising solution that builds on eme
APA, Harvard, Vancouver, ISO, and other styles
9

K Lokeshwaran, Jayanthi Arumugam, Komal Kumar Napa, Senthil Murugan Janakiraman, and Balamurugan AG. "TS-AODV: Leveraging Trust for Secure Routing in Manets." International Research Journal of Multidisciplinary Scope 05, no. 04 (2024): 1170–79. http://dx.doi.org/10.47857/irjms.2024.v05i04.01440.

Full text
Abstract:
Mobile Ad-hoc Networks (MANETs) offer on-the-fly connectivity for devices without fixed infrastructure, but their decentralized nature makes them vulnerable to malicious nodes that disrupt communication. Existing routing protocols struggle to guarantee reliable data transmission in such environments. This paper introduces Trusted Ad hoc On-Demand Distance Vector (TS-AODV), a novel secure routing protocol for MANETs that leverages trust mechanisms to bolster network security. TS-AODV establishes a trust management system, assigning trust values to each node based on past behavior in forwarding
APA, Harvard, Vancouver, ISO, and other styles
10

Ding, Zhaolong, Huijie Liu, Feng Tian, Zijian Yang, and Nan Wang. "Fast-Convergence Reinforcement Learning for Routing in LEO Satellite Networks." Sensors 23, no. 11 (2023): 5180. http://dx.doi.org/10.3390/s23115180.

Full text
Abstract:
Fast convergence routing is a critical issue for Low Earth Orbit (LEO) constellation networks because these networks have dynamic topology changes, and transmission requirements can vary over time. However, most of the previous research has focused on the Open Shortest Path First (OSPF) routing algorithm, which is not well-suited to handle the frequent changes in the link state of the LEO satellite network. In this regard, we propose a Fast-Convergence Reinforcement Learning Satellite Routing Algorithm (FRL–SR) for LEO satellite networks, where the satellite can quickly obtain the network link
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Critical packet forwarding"

1

Sikkanan, Sobana, and Kasthuri M. "Denial-of-Service and Botnet Analysis, Detection, and Mitigation." In Forensic Investigations and Risk Management in Mobile and Wireless Communications. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9554-0.ch005.

Full text
Abstract:
The internet is designed for processing and forwarding of any packet in a best effort manner. The packets carried by the internet may be malicious or not. Most of the time, internet architecture provides an unregulated path to victims. Denial-of-service (DoS) attack is the most common critical threat that causes devastating effects on the internet. The Botnet-based DoS attack aims to exhaust both the target resources and network bandwidth, thereby making the network resources unavailable for its valid users. The resources are utilized by either injecting a computer virus or flooding the networ
APA, Harvard, Vancouver, ISO, and other styles
2

Sikkanan, Sobana, and Kasthuri M. "Denial-of-Service and Botnet Analysis, Detection, and Mitigation." In Research Anthology on Combating Denial-of-Service Attacks. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5348-0.ch002.

Full text
Abstract:
The internet is designed for processing and forwarding of any packet in a best effort manner. The packets carried by the internet may be malicious or not. Most of the time, internet architecture provides an unregulated path to victims. Denial-of-service (DoS) attack is the most common critical threat that causes devastating effects on the internet. The Botnet-based DoS attack aims to exhaust both the target resources and network bandwidth, thereby making the network resources unavailable for its valid users. The resources are utilized by either injecting a computer virus or flooding the networ
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!