[HTML][HTML] A systematic analysis and review on producer mobility management in named data networks: Research background and challenges
The effectiveness of the current Internet architecture has been challenged due to the
exponential and revolutionary expansion of smart mobile devices and content requirements …
exponential and revolutionary expansion of smart mobile devices and content requirements …
Fuzzy ELECTRE multi-criteria decision-making technique for achieving reliable data dissemination in MANETs
SM Udhaya Sankar, R Praveen… - International Journal of …, 2023 - Springer
Reliable data dissemination between mobile nodes necessitates cooperation as they are
exchanged in an environment which is self-configuring with a centralized infrastructure. In …
exchanged in an environment which is self-configuring with a centralized infrastructure. In …
TACR: Trust aware clustering-based routing for secure and reliable VANET communications
MV Kadam, VM Vaze, SR Todmal - Wireless Personal Communications, 2023 - Springer
Achieving security and privacy preservation considering the network dynamics and
overhead is a vital research problem. Long-distance communications in highly dynamic …
overhead is a vital research problem. Long-distance communications in highly dynamic …
[HTML][HTML] A trusted security approach to detect and isolate routing attacks in mobile ad hoc networks
GV Lakshmi, P Vaishnavi - Journal of Engineering Research, 2024 - Elsevier
Background Secure routing is of utmost importance in protecting mobile devices from
external threats. However, the dynamic characteristics of Mobile Ad hoc Networks (MANETs) …
external threats. However, the dynamic characteristics of Mobile Ad hoc Networks (MANETs) …
An energy-efficient MANET relay node selection and routing using a fuzzy-based analytic hierarchy process
The group of ad hoc nodes without any infrastructure is a mobile ad hoc network (MANET).
The nodes in these networks move and provide regular outcomes as a result of the frequent …
The nodes in these networks move and provide regular outcomes as a result of the frequent …
A reliable protocol for data aggregation and optimized routing in IoT WSNs based on machine learning
N Chandnani, CN Khairnar - Wireless Personal Communications, 2023 - Springer
Abstract Data Aggregation for IoT-WSN, based on Machine Learning (ML), allows the
Internet of Things (IoT) and Wireless Sensor Networks (WSN) to send accurate data to the …
Internet of Things (IoT) and Wireless Sensor Networks (WSN) to send accurate data to the …
Enhancing security in the Internet of Things: A trust-based protocol for resilient communication
AA Ali, MM Hussain, AS Rao, S Lavanya… - SN Computer …, 2024 - search.proquest.com
The quick increasing in the Internet of Things (IoT) devices has raised significant security
concerns, particularly in the face of reactive jamming attacks. This paper proposes a trust …
concerns, particularly in the face of reactive jamming attacks. This paper proposes a trust …
An obstacle aware efficient MANET routing with optimized Bi-LSTM and multi-objective constraints on improved heuristic algorithm
RM Bhavadharini… - Journal of Ambient …, 2023 - content.iospress.com
Abstract Mobile Ad Hoc Networks (MANETs) are self-organizing, self-configuring, and
infrastructure-less networks for performing multi-hop communication. The source mobile …
infrastructure-less networks for performing multi-hop communication. The source mobile …
[PDF][PDF] A Novel Gradient Boosted Energy Optimization Model (GBEOM) for MANET.
N Veeraiah, Y Alotaibi, S Alghamdi… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
Mobile Ad Hoc Network (MANET) is an infrastructure-less network that is comprised of a set
of nodes that move randomly. In MANET, the overall performance is improved through …
of nodes that move randomly. In MANET, the overall performance is improved through …
Hybrid Fuzzy Rule Algorithm and Trust Planning Mechanism for Robust Trust Management in IoT-Embedded Systems Integration
The Internet of Things (IoT) is rapidly expanding and becoming an integral part of daily life,
increasing the potential for security threats such as malware or cyberattacks. Many …
increasing the potential for security threats such as malware or cyberattacks. Many …