Efficient cluster head selection algorithm for MANET
In mobile ad hoc network (MANET) cluster head selection is considered a gigantic
challenge. In wireless sensor network LEACH protocol can be used to select cluster head on …
challenge. In wireless sensor network LEACH protocol can be used to select cluster head on …
Secure routing and data transmission in mobile ad hoc networks
WS Alnumay, U Ghosh - arXiv preprint arXiv:1402.2108, 2014 - arxiv.org
In this paper, we present an identity (ID) based protocol that secures AODV and TCP so that
it can be used in dynamic and attack prone environments of mobile ad hoc networks. The …
it can be used in dynamic and attack prone environments of mobile ad hoc networks. The …
A preference-based protocol for trust and head selection for cluster-based MANET
R Mylsamy, S Sankaranarayanan - Wireless Personal Communications, 2016 - Springer
Privacy is vital for outsized and opaque ad hoc networks. A preference-based protocol for
trust and head selection (2PTH) algorithm is proposed for communication privacy from …
trust and head selection (2PTH) algorithm is proposed for communication privacy from …
Efficient monitoring for intrusion detection in wireless sensor networks
T Abdellatif, M Mosbah - Concurrency and Computation …, 2020 - Wiley Online Library
In wireless sensor networks (WSN), Intrusion Detection through sensor monitoring enables
the detection of intricate security attacks such as denial of service and routing attacks …
the detection of intricate security attacks such as denial of service and routing attacks …
Towards secure data forwarding with ANFIS and trust evaluation in wireless sensor networks
PN Renjith - Wireless Personal Communications, 2020 - Springer
The rapid growth of Wireless Networking and MEMS augmented the human lifestyle. The
combination of Wireless Sensor Networks (WSN) with Artificial Intelligence (AI) payed way to …
combination of Wireless Sensor Networks (WSN) with Artificial Intelligence (AI) payed way to …
Разработка модели защищенной кластерной беспроводной сенсорной сети
ЕС Абрамов, ЕС Басан - Известия Южного федерального …, 2013 - cyberleninka.ru
Защита беспроводных сенсорных сетей (БСС) является актуальной проблемой, так как
узлы сети имеют небольшую вычислительную мощность, ограниченный заряд батареи …
узлы сети имеют небольшую вычислительную мощность, ограниченный заряд батареи …
[PDF][PDF] Section based hex-cell routing algorithm (SBHCR)
M Qatawneh, A Alamoush… - International Journal of …, 2015 - academia.edu
ABSTRACT A Hex-Cell network topology can be constructed using units of hexagon cells. It
has been introduced in the literature as interconnection network suitable for large parallel …
has been introduced in the literature as interconnection network suitable for large parallel …
Development of a secure Cluster-based wireless sensor network model
E Abramov, E Basan, O Makarevich - Proceedings of the 6th …, 2013 - dl.acm.org
In this paper we consider a clustering wireless sensor network which needs to be protected.
The main aim of this article is development of a secure clustering wireless sensor network …
The main aim of this article is development of a secure clustering wireless sensor network …
[PDF][PDF] Reputation-based clustering algorithms in mobile ad hoc networks
Clustering is one of the main techniques that are used to increase the scalability of MANETs,
but without any security considerations clustering is prone to various security attacks. Some …
but without any security considerations clustering is prone to various security attacks. Some …
A secure clustering in MANET through direct trust evaluation technique
K Gomathi, B Parvathavarthini - 2015 International Conference …, 2015 - ieeexplore.ieee.org
Ad hoc network is a self organizing wireless network, made up of mobile nodes that act in
both way as node and router. Wired network with fixed infrastructure defense against attacks …
both way as node and router. Wired network with fixed infrastructure defense against attacks …