Author of the publication

Scenario and countermeasure for replay attack using join request messages in LoRaWAN.

, , , and . ICOIN, page 718-720. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing positioning errors in the important access point selection method for fingerprint localization by spatial partitioning., , , and . ICOIN, page 445-447. IEEE, (2017)Instant graph routing: lightweight graph generation scheme., , and . ICUIMC, page 73. ACM, (2011)MDA approach towards a unified application development framework., , and . ICUFN, page 780-784. IEEE, (2017)A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain., , and . ICUFN, page 817-819. IEEE, (2018)ENUM Based Service Discovery Architecture for 6LoWPAN., , , and . WCNC, page 1-6. IEEE, (2010)A V2X Access Authorization Mechanism based on Decentralized ID (DID) and Verifiable Credentials (VC)., , , , and . ICOIN, page 801-805. IEEE, (2023)GARPAN: Gateway-Assisted Inter-PAN Routing for 6LoWPANs., , , , and . ICCSA (2), volume 3981 of Lecture Notes in Computer Science, page 186-194. Springer, (2006)Remote Configuration Mechanism for IP Based Ubiquitous Sensor Networks., , and . APNOMS, volume 5787 of Lecture Notes in Computer Science, page 423-426. Springer, (2009)Virtual group leader election algorithm in distributed WSN., , and . ICUFN, page 143-148. IEEE, (2014)A survey of flash memory design and implementation of database in flash memory., and . ISKE, page 1256-1259. IEEE, (2008)