2023
DOI: 10.18280/i2m.220202
|View full text |Cite
|
Sign up to set email alerts
|

Congestion Control Mechanism on Transport Layer Protocol: The Application of Terahertz Frequency

Sabelo Emmanuel Sithole,
Prabhat Thakur,
Ghanshyam Singh

Abstract: Due to the increasing population, there is a demand for new technologies that require nanotechnology. As a result, rapid increase in congestion will be experienced in the transport layer protocol. The transport layer protocol serves as a vehicle to transmit data from one layer to the next. Nanotechnology uses extremely small components in the region of 1×10 -9 or smaller. Moreover, with the new viruses or pandemics already detected like Ibola, Coronavirus, Monkeypox, etc. new technologies that will transmit da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 23 publications
0
0
0
Order By: Relevance
“…The application of the Internet of Medical Vehicles is essentially developed based on the application of IOT technology. Table 11 represents various potential sophisticated types of cyber-attacks that can be carried out by malicious hackers and attackers at various layers of the IOMV, right from the source, i.e., onboard medical devices, up to the target recipient devices at hospitals through their interconnecting communication channels and networks, including common attacks that can occur at any layer of the IOMV system [89,90]. A variety of network devices communicating through vehicle IVN and wireless communications (e.g., Gateways, Network Nodes, WiFi Devices, Servers), IOMV devices connected at the physical level (like medical devices, HMI, USBs, etc.…”
Section: Types and Characteristics Of Cyber-attacksmentioning
confidence: 99%
“…The application of the Internet of Medical Vehicles is essentially developed based on the application of IOT technology. Table 11 represents various potential sophisticated types of cyber-attacks that can be carried out by malicious hackers and attackers at various layers of the IOMV, right from the source, i.e., onboard medical devices, up to the target recipient devices at hospitals through their interconnecting communication channels and networks, including common attacks that can occur at any layer of the IOMV system [89,90]. A variety of network devices communicating through vehicle IVN and wireless communications (e.g., Gateways, Network Nodes, WiFi Devices, Servers), IOMV devices connected at the physical level (like medical devices, HMI, USBs, etc.…”
Section: Types and Characteristics Of Cyber-attacksmentioning
confidence: 99%