Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks

E Elmahdi, SM Yoo, K Sharshembiev - Journal of Information Security and …, 2020 - Elsevier
A mobile ad hoc network (MANET) is a dynamic wireless network without any infrastructures.
It is vulnerable to many types of attacks. Thus, security has turned out to be an important …

Securing data forwarding against blackhole attacks in mobile ad hoc networks

E Elmahdi, SM Yoo… - 2018 IEEE 8th annual …, 2018 - ieeexplore.ieee.org
A mobile ad hoc network (MANET) is vulnerable to many types of attacks. Thus, security has
turned out to be an important factor to facilitate secured communication between mobile …

[PDF][PDF] A survey on elliptic curve cryptography for pervasive computing environment

V Katiyar, K Dutta, S Gupta - International Journal of Computer …, 2010 - Citeseer
In today‟ s era of the ubiquitous computing, the Internet has become the main mode of data
communication. Most of the devices used in wireless/mobile environments, that form …

Chinese remainder theorem-based RSA-threshold cryptography in MANET using verifiable secret sharing scheme

S Sarkar, B Kisku, S Misra… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
A mobile ad hoc network (MANET) is an infrastructure-less system having no designated
access points or routers and it has a dynamic topology. MANETs follow a distributed …

An integrated model to make cloud authentication and multi-tenancy more secure

H Dey, R Islam, H Arif - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Cloud Computing is an important term of modern technology. The usefulness of Cloud is
increasing day by day and simultaneously more and more security problems are arising as …

A secure and efficient cluster based location aware routing protocol in MANET

SS Jamaesha, S Bhavani - Cluster Computing, 2019 - Springer
Mobile adhoc network (MANET) is a collection of node under a communication with each
other nodes in the network. They are mobile nodes which can change its location according …

A new version of Kerberos authentication protocol using ECC and threshold cryptography for cloud security

MR Sutradhar, N Sultana, H Dey… - 2018 Joint 7th …, 2018 - ieeexplore.ieee.org
Dependency on cloud computing are increasing day by day due to its beneficial aspects. As
day by day we are relying on cloud computing, the securities issues are coming up. There …

A novel lightweight authentication scheme for mobile ad hoc networks

T Eissa, SA Razak, MA Ngadi - Arabian Journal for Science and …, 2012 - Springer
The lack of infrastructure and central authority (CA) makes MANET security a very
challenging mission. Fast and lightweight security solutions are required because of the …

Towards providing a new lightweight authentication and encryption scheme for MANET

T Eissa, SA Razak, MDA Ngadi - Wireless Networks, 2011 - Springer
Abstract Mobile Ad hoc Network (MANET) is a wireless technology for mobile nodes. This
network is setup on fly without any infrastructure. The mobility nature of this network and the …

[PDF][PDF] Secure routing scheme in MANETs using secret key sharing

A Amuthan, BA Baradwaj - International Journal of Computer Applications, 2011 - Citeseer
ABSTRACT A Mobile Ad-hoc NETwork (MANETs) follows a dynamic topology with
distributed architecture. MANETs has no basic infrastructure also has no fixed access point …