Security aware dual authentication-based routing scheme using fuzzy logic with secure data dissemination for mobile ad-hoc networks

GM Borkar, AR Mahajan - International Journal of …, 2018 - inderscienceonline.com
The security of mobile ad-hoc networks (MANETs) has been getting a great deal of
consideration in the field of wireless networking because MANETs are vulnerable to …

An Adaptive RIPng Routing Protocol with Secure Packet Transmission in MANETs

LH Patil, GM Borkar - Journal of Applied Security Research, 2018 - Taylor & Francis
In recent times, the interest for different multimedia applications such as video conferencing,
surveillance system, and video on request service over Mobile ad-hoc networks (MANETs) …

A secure trusted multipath routing and optimal fuzzy logic for enhancing QoS in MANETs

M Rajashanthi, K Valarmathi - Wireless Personal Communications, 2020 - Springer
Abstract Wireless Mobile Ad Hoc Network (MANET) is an independentmethod of mobile
nodes. The multipath routing in MANET is the most important pertains for securable …

Improved Routing and Secure Data Transmission in Mobile Adhoc Networks Using Trust Based Efficient Randomized Multicast Protocol

NK Sahoo - Research Journal of Computer Systems and …, 2021 - technicaljournals.org
There is growing concern regarding secure data transfer due to the use of Mobile Adhoc
Network (MANET) in many forthcoming technologies and applications. This research …

[PDF][PDF] DTASR: dual threshold-based authentication for secure routing in mobile adhoc network

BUI Khan, RF Olanrewaju, AM Baba, RN Mir… - World Eng. Appl …, 2016 - academia.edu
The Mobile Adhoc Network (MANET) is not only limited to the temporary rescue operations
rather it has been conceptualized to be adopted into many civil society comfort and safety …

Analysis of secure routing protocol for wireless adhoc networks using efficient DNA based cryptographic mechanism

ES Babu, C Nagaraju, MHMK Prasad - Procedia Computer Science, 2015 - Elsevier
This paper presents a novel concept for designing an efficient security solution that can
protect wireless ad hoc networks from heterogeneous attacks. This proposed Secure …

JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in Mobile Adhoc Network

BUI Khan, NF Zulkurnain, RF Olanrewaju… - Proceedings of SAI …, 2018 - Springer
The demands of a higher degree of security level for the mobile ad-hoc network are yet to
meet the best solution. Owing to the dynamic topology and decentralization issue, the …

Improved Secure Communication Based Adhoc Routing in Mobile Network Technology

S Mishra - … Conference on Distributed Computing and Electrical …, 2023 - ieeexplore.ieee.org
Fifth-generation (5G) is the future of mobile network technology; the development of 5G
mobile services is based on a comprehensive study of mobile services' global trends. 5G is …

A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks

AR Rajeswari, K Kulothungan, S Ganapathy… - Peer-to-Peer Networking …, 2019 - Springer
Abstract Mobile Ad-hoc Networks have distinct characteristics namely lack of centralized
control and management, severe resource constraints in terms of energy level of nodes …

Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence‐based secure ad‐hoc on‐demand distance vector …

AR Patil, GM Borkar - IET Wireless Sensor Systems, 2023 - Wiley Online Library
In a mobile ad hoc network (MANET), all nodes are communicated with one another across
wireless networks to create a temporary network without the support of centralised …