[PDF][PDF] Mobile Ad Hoc Network in Disaster Area Network Scenario: A Review on Routing Protocols.
ZA Younis, AM Abdulazeez… - … Journal of Online & …, 2021 - researchgate.net
Disasters could cause communication systems to partially or completely down. In such a
case, relief operations need a rapidly deployed communication system to save lives …
case, relief operations need a rapidly deployed communication system to save lives …
[HTML][HTML] Systematic review on modification to the ad-hoc on-demand distance vector routing discovery mechanics
Mobile ad-hoc networks (MANETs) and wireless mesh networks (WMNs) are used in a
variety of research areas, including the military, industry, healthcare, agriculture, the Internet …
variety of research areas, including the military, industry, healthcare, agriculture, the Internet …
CUWSN: energy efficient routing protocol selection for cluster based underwater wireless sensor network
K Bhattacharjya, S Alam, D De - Microsystem Technologies, 2019 - Springer
Energy efficient routing protocol selection for Cluster based Underwater Wireless Sensor
Network (CUWSN) is aimed to support monitoring and controlling underwater scenarios in …
Network (CUWSN) is aimed to support monitoring and controlling underwater scenarios in …
EESSMT: an energy efficient hybrid scheme for securing mobile ad hoc networks using IoT
Mobile ad hoc networks are attaining popularity to its highest currently, as the users need
wireless connectivity regardless of their geographical location. Threats of security attacks …
wireless connectivity regardless of their geographical location. Threats of security attacks …
EAODV: Detection and removal of multiple black hole attacks through sending forged packets in MANETs
T Delkesh, MA Jabraeil Jamali - Journal of Ambient Intelligence and …, 2019 - Springer
Detecting and removing black hole attacks are considered to be one major routing security
issue in mobile ad hoc networks (MANETs). Malicious nodes existing on the delivery route of …
issue in mobile ad hoc networks (MANETs). Malicious nodes existing on the delivery route of …
[PDF][PDF] Simulation based comparison of routing protocols in wireless multihop adhoc networks
Routing protocols are responsible for providing reliable communication between the source
and destination nodes. The performance of these protocols in the ad hoc network family is …
and destination nodes. The performance of these protocols in the ad hoc network family is …
[HTML][HTML] Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things
The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to
their resource-constrained nature. Extensive research efforts have been dedicated to …
their resource-constrained nature. Extensive research efforts have been dedicated to …
Performance analysis of black hole attack and flooding attack AODV routing protocol on VANET (vehicular ad-hoc network)
Wireless technology is widely used today and is growing rapidly. One of the wireless
technologies is VANET where the network can communicate with vehicles (V2V) which can …
technologies is VANET where the network can communicate with vehicles (V2V) which can …
STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based MANET
Mobile ad hoc networks (MANET) is a type of networks that consists of autonomous nodes
connecting directly without a top-down network architecture or central controller. Absence of …
connecting directly without a top-down network architecture or central controller. Absence of …
[HTML][HTML] pCSSL: A stochastic extension to MARTE/CCSL for modeling uncertainty in cyber physical systems
Abstract Cyber-Physical Systems (CPSs) are networks of heterogeneous embedded
systems immersed within a physical environment, thus combining discrete and continuous …
systems immersed within a physical environment, thus combining discrete and continuous …