Robust verification protocols are crucial for maintaining the security and reliability of sensitive information due to the increasing complexity of cyber-attacks. This paper introduces a novel 5G Secure Handover Protocol aimed at addressing security and effectiveness issues encountered in existing systems. The proposed protocol is robust against various attacks, including de-synchronization, replay, man-in-the-middle (MITM), denial of services (DoS), and jamming, ensures perfect forward key secrecy, safeguarding communication confidentiality.
View Article and Find Full Text PDFIn the rapidly evolving landscape of agricultural technology, image processing has emerged as a powerful tool for addressing critical agricultural challenges, with a particular focus on the identification and management of crop diseases. This study is motivated by the imperative need to enhance agricultural sustainability and productivity through precise plant health monitoring. Our primary objective is to propose an innovative approach combining support vector machine (SVM) with advanced image processing techniques to achieve precise detection and classification of fig leaf diseases.
View Article and Find Full Text PDFWireless Sensor Networks (WSNs) continue to face two major challenges: energy and security. As a consequence, one of the WSN-related security tasks is to protect them from Denial of Service (DoS) and Distributed DoS (DDoS) attacks. Machine learning-based systems are the only viable option for these types of attacks, as traditional packet deep scan systems depend on open field inspection in transport layer security packets and the open field encryption trend.
View Article and Find Full Text PDF