EESSMT: an energy efficient hybrid scheme for securing mobile ad hoc networks using IoT
Mobile ad hoc networks are attaining popularity to its highest currently, as the users need
wireless connectivity regardless of their geographical location. Threats of security attacks …
wireless connectivity regardless of their geographical location. Threats of security attacks …
Security challenges in mobile ad hoc networks: A survey
MANET is a kind of Ad hoc network with mobile, wireless nodes. Because of its special
characteristics like dynamic topology, hop-by-hop communications and easy and quick …
characteristics like dynamic topology, hop-by-hop communications and easy and quick …
[PDF][PDF] An Overview of security issues in Mobile Ad hoc Networks
VM Agrawal, H Chauhan - International Journal of Computer …, 2015 - academia.edu
Mobile ad hoc networks (MANETs) are collections of self-organizing mobile nodes with
dynamic topologies and no centralized authority. Each node participating in the network acts …
dynamic topologies and no centralized authority. Each node participating in the network acts …
Empirical analysis of energy-efficient hybrid protocol under black hole attack in MANETs
Self-organizing networks such as mobile ad hoc networks (MANETs) are less secured
networks which are more vulnerable to different kinds of attacks. The most common attack of …
networks which are more vulnerable to different kinds of attacks. The most common attack of …
Mobile Adhoc Networks Security Challenges: A Survey
S Kausar Fatima, S Gauhar Fatima… - … Journal of Advanced …, 2019 - papers.ssrn.com
MANET is a kind of Adhoc network with mobile, and wireless nodes. Because of its distinct
features like dynamic topology, hop-by-hop communications and easy and quick setup …
features like dynamic topology, hop-by-hop communications and easy and quick setup …
[PDF][PDF] A Study on security challenges in mobile ad hoc network
SB Priya, C Theebendra - … of research in computer applications and …, 2016 - academia.edu
MANET is a kind of AdHoc network with mobile, wireless nodes. Because of its special
characteristics like dynamic topology, hop-by-hop communications and easy and quick …
characteristics like dynamic topology, hop-by-hop communications and easy and quick …
A study on hierarchical structure and blockchain-based node authentication mechanism in manet
H Yang - Convergence Security Journal, 2019 - koreascience.kr
MANET has many security vulnerabilities because it consists of only mobile nodes using
wireless. In particular, it is a very important factor determining network performance that …
wireless. In particular, it is a very important factor determining network performance that …
[PDF][PDF] International Journal of Computer Engineering & Technology (ijcet)
S Kumaraswamy, SH Manjula, KR Venugopal… - Journal Impact …, 2013 - researchgate.net
Cryptographic approaches are traditional and preferred methodologies used to preserve the
privacy of data released for analysis. Privacy Preserving Data Mining (PPDM) is a new trend …
privacy of data released for analysis. Privacy Preserving Data Mining (PPDM) is a new trend …
[PDF][PDF] SECURITY CONSIDERATIONS IN A MARINE COMMUNICATION NETWORK FOR FISHERMEN
With the recent advancements in and popularity of wireless networks, the security based
issues are also increasing considerably. In this paper, we look at the data security and …
issues are also increasing considerably. In this paper, we look at the data security and …
[PDF][PDF] A Survey on Comparison of Various Protocols and Key Management Issues in Manet
Remote Network incorporates a bigger favorable position in the present correspondence
application like ecological, movement, military and wellbeing perception. To understand …
application like ecological, movement, military and wellbeing perception. To understand …