RTS: A robust and trusted scheme for IoT-based mobile wireless mesh networks

K Haseeb, IU Din, A Almogren, N Islam… - IEEE Access, 2020 - ieeexplore.ieee.org
Wireless mesh networks consist of various mesh clients that are organized in an unfixed
infrastructure and packets are forwarded using a multi-hop model. Routing protocols have a …

RETRACTED ARTICLE: An optimized distributed secure routing protocol using dynamic rate aware classified key for improving network security in wireless sensor …

SS Sathya, K Umadevi - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
To transmit information over the industrial network today, you need data in a secure way to
make it a high security root. Routing security issues in the wireless web network have been …

[HTML][HTML] Design and analysis of intrusion detection systems for wireless mesh networks

FS Al-Anzi - Digital Communications and Networks, 2022 - Elsevier
Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless
networks. Wireless mesh networking technology has been pivotal in providing an affordable …

A security architecture for attacks detection and authentication in wireless mesh networks

PK Sharma, R Mahajan, Surender - Cluster Computing, 2017 - Springer
A wireless mesh network (WMN) consists of numerous mesh nodes. It provides effective
wireless internet connectivity due to efficient network architecture where mobile end users …

Trust-based multi-level secure routing for authentication and authorisation in WMN

PK Sharma, R Mahajan… - International Journal of …, 2021 - inderscienceonline.com
Wireless-mesh-networking (WMN) is a developing technology in which users may have
different authorisation-levels by not accessing information for which their authorisation level …

Deep restricted and additive homomorphic ElGamal privacy preservations over big healthcare data

K Sujatha, V Udayarani - International Journal of Intelligent …, 2022 - emerald.com
Purpose The purpose of this paper is to improve the privacy in healthcare datasets that hold
sensitive information. Putting a stop to privacy divulgence and bestowing relevant …

[PDF][PDF] Insight to research progress on secure routing in wireless Ad Hoc network

J Neeli, NK Cauvery - International Journal of Advanced …, 2017 - pdfs.semanticscholar.org
Wireless Ad hoc Network offers a cost effective communication to the users free from any
infrastructural dependencies. It is characterized by decentralized architecture, mobile nodes …

GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks

T Abera, F Brasser, L Gunn, P Jauernig… - Proceedings of the 24th …, 2021 - dl.acm.org
Autonomous collaborative networks of devices are rapidly emerging in numerous domains,
such as self-driving cars, smart factories, critical infrastructure, and Internet of Things in …

[PDF][PDF] INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING

A Muniappan, GA Dalton, A Prithiviraj, T Jackulin… - researchgate.net
Wireless Mesh Networks (WMN) are thought to be the best solution for last-mile
communication network supply because to their flexible deployment and reasonably priced …

CIANI: Cognitive Intelligence for Assessing Network Intrusion in Mobile Adhoc Network

K Pradeep Kumar, BRP Babu - Wireless Personal Communications, 2019 - Springer
A mobile adhoc network is accompanied by various cost-effective communicational benefits
as well as prolonged unsolved security issues. Owing to dynamic topology, decentralized …