Ordering: A reliable qualitative information for the alignment of sketch and metric maps

S Jan, J Wang, A Schwering… - 2013 IEEE 12th …, 2013 - ieeexplore.ieee.org
Sketch maps are externalizations of cognitive maps which are typically distorted,
schematized, incomplete, and generalized. Processing spatial information from sketch maps …

Membership models and the design of authentication protocols for MANETs

S Maity, RC Hansdah - 2012 26th International Conference on …, 2012 - ieeexplore.ieee.org
Authentication protocols are very much essential for secure communication in mobile ad hoc
networks (MANETs). A number of authentication protocols for MANETs have been proposed …

Hybrid Algorithm for Malicious Node Detection and Secure Routing using Cryptographic Applications in MANET

S Muruganandam, J Renjit - … of the First International Conference on …, 2021 - eudl.eu
Abstract In Mobile Ad-hoc network every node can change its position dynamically without
having any fixed infrastructure. The path information is maintained permanently for routing …

A Secure and Efficient Authentication Protocol (SEAP) for MANETs wIth Membership Revocation

S Maity, RC Hansdah - 2013 27th International Conference on …, 2013 - ieeexplore.ieee.org
In this paper, we propose a novel authentication protocol for MANETs requiring stronger
security. The protocol works on a two-tier network architecture with client nodes and …

Securing Nodes in MANETs Using Node Based Key Management Scheme

S Tapaswi, VS Kushwah - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
A mobile ad hoc network (MANET) is a kind of wireless communication infrastructure that
does not have base stations or routers. Each node acts as a router and is responsible for …

[图书][B] Soluciones para la autenticación y gestión de subredes en manets y vanets

CC Gil - 2012 - search.proquest.com
Soluciones para la autenticación y gestión de subredes en MANETs y VANETs Page 1
Soluciones para la autenticación y gestión de subredes en MANETs y VANETs Directora PINO …

[PDF][PDF] ALGORITHMS BASED ON SPIDER DADDY LONG LEGS FOR FINDING THE OPTIMAL ROUTE IN SECURING MOBILE AD HOC NETWORKS

KI GHATHWAN - etd.uum.edu.my
Mobile ad hoc networks (MANETs) are wireless networks that are subject to severe attacks,
such as the black hole attack. One of the goals in the research is to find a method to prevent …

Security and performance analysis of the SEAP authentication protocol in MANETs

S Maity, RC Hansdah - International Journal of Ad Hoc and …, 2017 - inderscienceonline.com
This paper describes and analyses a secure and efficient authentication protocol (SEAP)
designed for mobile ad-hoc networks (MANETs). The SEAP protocol is a server coordination …

[PDF][PDF] A Dynamic Solution for Encryption Challenges in Ubiquitous Environment

MA Saeed, K Ahmed, WM Qazi, A Athar, Y Saeed - researchgate.net
Today'stechnological development is mainly focusing on the automation of processes at
hardware or software level ie to make them capable of adjusting themselves according to …

[PDF][PDF] Mobile Computing Security for Ad Hoc Networks Using Authentication

VS Kushwah, AKS Sanger, KK Chauhan - researchgate.net
Today security is important everywhere and anywhere. Because channel communication
between two or more networks or nodes is not easy. An attacker or unwanted disaster may …