91 Hits in 5.6 sec

MACO-DHKE Based Secure Data Transmission in MANETs

Sandeep Dhende, Suresh Shirbahadurkar
2022 International journal of electrical and computer engineering systems  
Mobile ad hoc networks (MANETs) are the self-sufficient nodes with their unique characteristics, such as open wireless mediums and self-motivated topology, which suffers from security weaknesses.  ...  Hence, this paper proposes a secure and QoS-aware data transmission in the MANET that improves the efficiency of the transmission.  ...  Analysis based on PDR (Higher PDR is better) Shankar, "Reliable Data Transmission Model for Mobile Ad Hoc Network Using Signcryption Technique", IEEE Transactions on Reliability, Vol. 69, No. 3, 2020  ... 
doi:10.32985/ijeces.13.4.1 fatcat:jh4n6w4ewbbofd6cm63s7utcv4

Optimal ECC Based Hybrid Signcryption for MANET Security

Sujatha R, Ramakrishnan M
2016 International Journal on Intelligent Electronic Systems  
It also provides reliable and efficient transmission of data in a MANET, which will drastically reduce intruders within and outside the network.  ...  In Mobile Ad hoc Network (MANET), to resolve the crisis in message confidentiality and authenticity , new hybrid algorithm is proposed based on Elliptic curve cryptography .Generally MANET"s are vulnerable  ...  A mobile ad hoc network (MANET) is a continuously self-configuring network, which does not have a fixed infrastructure.  ... 
doi:10.18000/ijies.30149 fatcat:ap6bdrjidfgxrishc5pf42hcmq

Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security

Sumithra Alagarsamy, S. P. Rajagopalan
2017 International Journal of Computer Applications  
The mobile network consists of 500 nodes in the network structure and uses the Random Way Point (RWM) model.  ...  The routing protocol used for EMV-CLSC technique uses Dynamic Source Routing (DSR) to improve the secured message communication between the sender and receiver in mobile networks.  ...  A Cluster-based Certificate Revocation with Vindication Capability (CCRVC) scheme was designed in [19] to improve the secure communications in mobile ad hoc networks.  ... 
doi:10.5120/ijca2017915705 fatcat:4eqe6i6c7jcknas6d3wpimcvpa

Enhanced Security for Information Flow in VANET using Signcryption and Trust level

Sumitkumar Singh, Vijayan R
2011 International Journal of Computer Applications  
Security in Vehicular ad hoc network has always been a major research area.  ...  Using Signcryption the computation cost is reduced as compared to Sign-thenencryption and also the confidentially and integrity of the message is conserved.  ...  BASIC IDEA VANET suffers from different type of attacks [3] and probably more than Mobile ad hoc networks due to their highly dynamic and volatile nature.  ... 
doi:10.5120/2010-2712 fatcat:aqg77qxcxjawrpdqhtv2offwcq

Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption

Muhammad Asghar Khan, Insaf Ullah, Shibli Nisar, Fazal Noor, Ijaz Mansoor Qureshi, Fahimullah Khanzada, Hizbullah Khattak, Muhammad Adnan Aziz
2020 Mobile Information Systems  
A group of small UAVs can synergize to form a flying ad hoc network (FANET).  ...  Formal as well as informal security analyses and the validation results, using the Automated Validation for Internet Security Validation and Application (AVISPA) tool, second such notion.  ...  Security Mechanisms in Flying Ad Hoc Networks. e primary security mechanisms for FANETs emphasize authenticity, confidentiality, and integrity of data via cryptography.  ... 
doi:10.1155/2020/8861947 fatcat:jvzj5spklfchvkn7ikkxvx4bl4

Evolution of Various Authentication Schemes in Wireless Network over a Decade

Pratik Singh, Bhawna Mallick
2015 International Journal of Computer Applications  
Openness of wireless network makes it more sensible for various security attacks. Authentication is the most vital procedure to make sure that the service is appropriately used.  ...  This paper, focus on the authentication schemes in wireless network that have evolved in last one a decade.  ...  Authentication is required in every field of networks such as sensor network (WSN), mobile ad-hoc networks (MANETs), vehicular ad-hoc networks (VANETs), roaming or hand-off process, WLAN; wireless mesh  ... 
doi:10.5120/ijca2015905516 fatcat:zay3sbwkgvebxk3aol6phbuaea

Approaches in Key Management Schemes in Mobile Ad-Hoc Networks: A Review

Nisha Sharma, Dr.Sugandha Singh
2016 IOSR Journal of Computer Engineering  
MANET (Mobile Ad hoc Network) is a convenient infrastructure-less contact web that is often susceptible to assorted assaults.  ...  The producing requests of mobile ad hoc webs (MANETs) have made connected protection subjects method extra important.  ...  Mobile Ad Hoc Networks (MANETS) are wireless mobile nodes that cooperatively form a network without infrastructure. In other words, ad hoc networking allows devices to create a network on demand.  ... 
doi:10.9790/0661-1804021014 fatcat:rjb25nuj5fee5a5fuzhdxew3ca

Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh Networks

Rekha Patil
2013 IOSR Journal of Computer Engineering  
We evaluate quality linked based in our approach using network simulator 2 (NS-2). Our approach discovers multiple paths effectively and the elected primary path is more reliable.  ...  In this paper, we propose a multipath routing protocol in wireless mesh networks. In this protocol, the source discovers multiple paths to the destination using parallel layer based approach.  ...  Acknowledgement The author(s) would like to thank faculty members and other contributor for their very useful advises.  ... 
doi:10.9790/0661-1360107 fatcat:gd2ulyqagveodduiy7kgh6xena

Making It Trustable: Acoustic-Based Signcryption Mutual Authentication for Multiwearable Devices

Shuhua Zhu, Xiaojie Li, Chunsheng Zhu, Lei Shu, Wei Sun
2015 International Journal of Distributed Sensor Networks  
Through series of experiments verifying the reliability and accuracy, the protocol shows that it can ensure secure data transmission and data sharing for multiwearable devices.  ...  As people rely heavily on such mobile and wearable devices, the need for seamless and secure communication across these spectra of devices becomes increasingly important.  ...  Acknowledgments The authors wish to thank the anonymous reviewers for their insightful and invaluable suggestions and comments. This work was in part supported by 973 Program (Grant no.  ... 
doi:10.1155/2015/846739 fatcat:d4yazf7qhve5fbn6xsnv3pyx5a

A Novel Routing Scheme to Avoid Link Error and Packet Dropping in Wireless Sensor Networks

M. Kavitha, B. Ramakrishnan, Resul Das
2016 International Journal of Computer Networks And Applications  
Packet loss is a major issue in Wireless Sensor Network (WSN) data transmission which is caused by malicious packet dropping and link error.  ...  The actual status of each packet transmission i.e., the packet loss information can be described by our technique.  ...  [14] proposed a mobile ad hoc network (MANET) which has no centralized administration. In MANET, the collection of mobile ad hoc node acts as selforganized nodes with dynamic topology.  ... 
doi:10.22247/ijcna/2016/v3/i4/48569 fatcat:5gg6zgwmorc2rc2ueak7hwnxvm

Secure and Blockchain-Based Emergency Driven Message Protocol for 5G Enabled Vehicular Edge Computing

Lewis Nkenyereye, Bayu Adhi Tama, Muhammad K. Shahzad, Yoon-Ho Choi
2019 Sensors  
We make use of lightweight multi-receiver signcryption scheme without pairing that offers low time consuming operations, security, privacy and access control.  ...  Security, architecture and communication solutions for BSM use cases have been largely documented on in the literature contrary to EDM due to several concerns such as the variant size of EDM, the appropriate  ...  Acknowledgments: This work was supported by BK21PLUS, Creative Human Resource Development Program for IT Convergence, by basic science research program through national research foundation korea (NRF)  ... 
doi:10.3390/s20010154 pmid:31881766 pmcid:PMC6983214 fatcat:tkecbjcpdvcibgkzrvpyxixyw4

A Secure Cryptography Based Clustering Mechanism for Improving the Data Transmission in MANET

Anubhuti Roda MOHINDRA, Charu GANDHI
2021 Walailak Journal of Science and Technology  
Providing security to the Mobile Ad-hoc Network (MANET) is one of the demanding and critical tasks in recent days, due to its dynamic nature.  ...  The simulation results evaluated the performance of the proposed security mechanism by using various measures and compared it with other techniques for proving the superiority.  ...  Path list includes IP for next hop, hop_count_1, path_status, Launch_time. Algorithm II -Secure route selection Step 1: Form a mobile ad-hoc network with sufficient N nodes.  ... 
doi:10.48048/wjst.2021.8987 fatcat:lirl2clyrjbr3ggtrrwf6tudwe


2013 2013 8th International Conference on Communications and Networking in China (CHINACOM)  
wei ziling, zhao baokang 3 Ad-hoc and Sensor Networks ASN01: Routing Algorithm for Wireless Sensor Network User Data Traffic Analysis for 3G Cellular Networks 468 Nan E, Xiaoli Chu, Weisi Guo, Jie Zhang  ...  Security Content Knowledge Based Privacy Estimation Model for Anonymous OSN 438 Data Publishing Cheng Cheng, Chunhong Zhang, Qingyuan Hu The Certificateless Multi-proxy Signcryption Scheme with Feature  ... 
doi:10.1109/chinacom.2013.6694552 fatcat:c3ost4eg4feizceykgnftvsgry

A Lightweight Nature Heterogeneous Generalized Signcryption (HGSC) Scheme for Named Data Networking-Enabled Internet of Things

Manazara Rehman, Hizbullah Khattak, Ahmed Saeed Alzahrani, Insaf Ullah, Muhammad Adnan, Syed Sajid Ullah, Noor Ul Amin, Saddam Hussain, Shah Jahan Khattak, Fawad Zaman
2020 Wireless Communications and Mobile Computing  
For scalable connectivity and efficient distribution, Named Data Networking (NDN) has been envisioned as a promising solution for future internet architecture.  ...  These smart objects sense and produce a huge amount of data for distribution. The current hostcentric networking paradigm is not that scalable to provide a suitable solution to the idea of IoT.  ...  Wireless Communications and Mobile Computing Data Availability All data generated or analyzed during this study are included in this published article.  ... 
doi:10.1155/2020/8857272 fatcat:lhqgjh3lhzerjkqyy4lrodjzyu

Ant Lion Optimizer based Clustering Algorithm for Wireless Body Area Networks in Livestock Industry

Fawad Saleem, Muhammad Nadeem Majeed, Jawaid Iqbal, Abdul Waheed, Abdul Rauf, Mahdi Zareei, Ehab Mahmoud Mohamed
2021 IEEE Access  
This is another concern that makes BANs different from other ad hoc networks like mobile ad hoc networks, vehicular ad hoc networks, or WSNs. 7) Privacy and Security Privacy and security of data in WBANs  ...  is the most crucial factor compared to WSNs or other ad hoc networks.  ... 
doi:10.1109/access.2021.3104643 fatcat:bskeeilhfrajjprnenzrt7eay4
« Previous Showing results 1 — 15 out of 91 results