A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
MACO-DHKE Based Secure Data Transmission in MANETs
2022
International journal of electrical and computer engineering systems
Mobile ad hoc networks (MANETs) are the self-sufficient nodes with their unique characteristics, such as open wireless mediums and self-motivated topology, which suffers from security weaknesses. ...
Hence, this paper proposes a secure and QoS-aware data transmission in the MANET that improves the efficiency of the transmission. ...
Analysis based on PDR (Higher PDR is better)
Shankar, "Reliable Data Transmission Model for Mobile Ad Hoc Network Using Signcryption Technique", IEEE Transactions on Reliability, Vol. 69, No. 3, 2020 ...
doi:10.32985/ijeces.13.4.1
fatcat:jh4n6w4ewbbofd6cm63s7utcv4
Optimal ECC Based Hybrid Signcryption for MANET Security
2016
International Journal on Intelligent Electronic Systems
It also provides reliable and efficient transmission of data in a MANET, which will drastically reduce intruders within and outside the network. ...
In Mobile Ad hoc Network (MANET), to resolve the crisis in message confidentiality and authenticity , new hybrid algorithm is proposed based on Elliptic curve cryptography .Generally MANET"s are vulnerable ...
A mobile ad hoc network (MANET) is a continuously self-configuring network, which does not have a fixed infrastructure. ...
doi:10.18000/ijies.30149
fatcat:ap6bdrjidfgxrishc5pf42hcmq
Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security
2017
International Journal of Computer Applications
The mobile network consists of 500 nodes in the network structure and uses the Random Way Point (RWM) model. ...
The routing protocol used for EMV-CLSC technique uses Dynamic Source Routing (DSR) to improve the secured message communication between the sender and receiver in mobile networks. ...
A Cluster-based Certificate Revocation with Vindication Capability (CCRVC) scheme was designed in [19] to improve the secure communications in mobile ad hoc networks. ...
doi:10.5120/ijca2017915705
fatcat:4eqe6i6c7jcknas6d3wpimcvpa
Enhanced Security for Information Flow in VANET using Signcryption and Trust level
2011
International Journal of Computer Applications
Security in Vehicular ad hoc network has always been a major research area. ...
Using Signcryption the computation cost is reduced as compared to Sign-thenencryption and also the confidentially and integrity of the message is conserved. ...
BASIC IDEA VANET suffers from different type of attacks [3] and probably more than Mobile ad hoc networks due to their highly dynamic and volatile nature. ...
doi:10.5120/2010-2712
fatcat:aqg77qxcxjawrpdqhtv2offwcq
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption
2020
Mobile Information Systems
A group of small UAVs can synergize to form a flying ad hoc network (FANET). ...
Formal as well as informal security analyses and the validation results, using the Automated Validation for Internet Security Validation and Application (AVISPA) tool, second such notion. ...
Security Mechanisms in Flying Ad Hoc Networks. e primary security mechanisms for FANETs emphasize authenticity, confidentiality, and integrity of data via cryptography. ...
doi:10.1155/2020/8861947
fatcat:jvzj5spklfchvkn7ikkxvx4bl4
Evolution of Various Authentication Schemes in Wireless Network over a Decade
2015
International Journal of Computer Applications
Openness of wireless network makes it more sensible for various security attacks. Authentication is the most vital procedure to make sure that the service is appropriately used. ...
This paper, focus on the authentication schemes in wireless network that have evolved in last one a decade. ...
Authentication is required in every field of networks such as sensor network (WSN), mobile ad-hoc networks (MANETs), vehicular ad-hoc networks (VANETs), roaming or hand-off process, WLAN; wireless mesh ...
doi:10.5120/ijca2015905516
fatcat:zay3sbwkgvebxk3aol6phbuaea
Approaches in Key Management Schemes in Mobile Ad-Hoc Networks: A Review
2016
IOSR Journal of Computer Engineering
MANET (Mobile Ad hoc Network) is a convenient infrastructure-less contact web that is often susceptible to assorted assaults. ...
The producing requests of mobile ad hoc webs (MANETs) have made connected protection subjects method extra important. ...
Mobile Ad Hoc Networks (MANETS) are wireless mobile nodes that cooperatively form a network without infrastructure. In other words, ad hoc networking allows devices to create a network on demand. ...
doi:10.9790/0661-1804021014
fatcat:rjb25nuj5fee5a5fuzhdxew3ca
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh Networks
2013
IOSR Journal of Computer Engineering
We evaluate quality linked based in our approach using network simulator 2 (NS-2). Our approach discovers multiple paths effectively and the elected primary path is more reliable. ...
In this paper, we propose a multipath routing protocol in wireless mesh networks. In this protocol, the source discovers multiple paths to the destination using parallel layer based approach. ...
Acknowledgement The author(s) would like to thank faculty members and other contributor for their very useful advises. ...
doi:10.9790/0661-1360107
fatcat:gd2ulyqagveodduiy7kgh6xena
Making It Trustable: Acoustic-Based Signcryption Mutual Authentication for Multiwearable Devices
2015
International Journal of Distributed Sensor Networks
Through series of experiments verifying the reliability and accuracy, the protocol shows that it can ensure secure data transmission and data sharing for multiwearable devices. ...
As people rely heavily on such mobile and wearable devices, the need for seamless and secure communication across these spectra of devices becomes increasingly important. ...
Acknowledgments The authors wish to thank the anonymous reviewers for their insightful and invaluable suggestions and comments. This work was in part supported by 973 Program (Grant no. ...
doi:10.1155/2015/846739
fatcat:d4yazf7qhve5fbn6xsnv3pyx5a
A Novel Routing Scheme to Avoid Link Error and Packet Dropping in Wireless Sensor Networks
2016
International Journal of Computer Networks And Applications
Packet loss is a major issue in Wireless Sensor Network (WSN) data transmission which is caused by malicious packet dropping and link error. ...
The actual status of each packet transmission i.e., the packet loss information can be described by our technique. ...
[14] proposed a mobile ad hoc network (MANET) which has no centralized administration. In MANET, the collection of mobile ad hoc node acts as selforganized nodes with dynamic topology. ...
doi:10.22247/ijcna/2016/v3/i4/48569
fatcat:5gg6zgwmorc2rc2ueak7hwnxvm
Secure and Blockchain-Based Emergency Driven Message Protocol for 5G Enabled Vehicular Edge Computing
2019
Sensors
We make use of lightweight multi-receiver signcryption scheme without pairing that offers low time consuming operations, security, privacy and access control. ...
Security, architecture and communication solutions for BSM use cases have been largely documented on in the literature contrary to EDM due to several concerns such as the variant size of EDM, the appropriate ...
Acknowledgments: This work was supported by BK21PLUS, Creative Human Resource Development Program for IT Convergence, by basic science research program through national research foundation korea (NRF) ...
doi:10.3390/s20010154
pmid:31881766
pmcid:PMC6983214
fatcat:tkecbjcpdvcibgkzrvpyxixyw4
A Secure Cryptography Based Clustering Mechanism for Improving the Data Transmission in MANET
2021
Walailak Journal of Science and Technology
Providing security to the Mobile Ad-hoc Network (MANET) is one of the demanding and critical tasks in recent days, due to its dynamic nature. ...
The simulation results evaluated the performance of the proposed security mechanism by using various measures and compared it with other techniques for proving the superiority. ...
Path list includes IP for next hop, hop_count_1, path_status, Launch_time. Algorithm II -Secure route selection Step 1: Form a mobile ad-hoc network with sufficient N nodes. ...
doi:10.48048/wjst.2021.8987
fatcat:lirl2clyrjbr3ggtrrwf6tudwe
Contents
2013
2013 8th International Conference on Communications and Networking in China (CHINACOM)
wei ziling, zhao baokang 3 Ad-hoc and Sensor Networks ASN01: Routing Algorithm for Wireless Sensor Network User Data Traffic Analysis for 3G Cellular Networks 468 Nan E, Xiaoli Chu, Weisi Guo, Jie Zhang ...
Security Content Knowledge Based Privacy Estimation Model for Anonymous OSN 438 Data Publishing Cheng Cheng, Chunhong Zhang, Qingyuan Hu The Certificateless Multi-proxy Signcryption Scheme with Feature ...
doi:10.1109/chinacom.2013.6694552
fatcat:c3ost4eg4feizceykgnftvsgry
A Lightweight Nature Heterogeneous Generalized Signcryption (HGSC) Scheme for Named Data Networking-Enabled Internet of Things
2020
Wireless Communications and Mobile Computing
For scalable connectivity and efficient distribution, Named Data Networking (NDN) has been envisioned as a promising solution for future internet architecture. ...
These smart objects sense and produce a huge amount of data for distribution. The current hostcentric networking paradigm is not that scalable to provide a suitable solution to the idea of IoT. ...
Wireless Communications and Mobile Computing
Data Availability All data generated or analyzed during this study are included in this published article. ...
doi:10.1155/2020/8857272
fatcat:lhqgjh3lhzerjkqyy4lrodjzyu
Ant Lion Optimizer based Clustering Algorithm for Wireless Body Area Networks in Livestock Industry
2021
IEEE Access
This is another concern that makes BANs different from other ad hoc networks like mobile ad hoc networks, vehicular ad hoc networks, or WSNs.
7) Privacy and Security Privacy and security of data in WBANs ...
is the most crucial factor compared to WSNs or other ad hoc networks. ...
doi:10.1109/access.2021.3104643
fatcat:bskeeilhfrajjprnenzrt7eay4
« Previous
Showing results 1 — 15 out of 91 results