Reliable data transmission model for mobile ad hoc network using signcryption technique

M Elhoseny, K Shankar - IEEE transactions on reliability, 2019 - ieeexplore.ieee.org
In recent years, the need for high security with reliability in the wireless network has
tremendously been increased. To provide high security in reliable networks, mobile ad hoc …

TIDS: threshold and identity-based security scheme for wireless ad hoc networks

H Deng, DP Agrawal - Ad Hoc Networks, 2004 - Elsevier
As various applications of wireless ad hoc network have been proposed, security has
received increasing attentions as one of the critical research challenges. In this paper, we …

Data security-based routing in MANETs using key management mechanism

P Bondada, D Samanta, M Kaur, HN Lee - Applied Sciences, 2022 - mdpi.com
A Mobile Ad Hoc Network (MANET) is an autonomous network developed using wireless
mobile nodes without the support of any kind of infrastructure. In a MANET, nodes can …

SPREAD: Enhancing data confidentiality in mobile ad hoc networks

W Lou, W Liu, Y Fang - IEEE INFOCOM 2004, 2004 - ieeexplore.ieee.org
Security is a critical issue in a mobile ad hoc network (MANET). We propose and investigate
a novel scheme, security protocol for reliable data delivery (SPREAD), to enhance the data …

Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems

A Zhang, L Wang, X Ye, X Lin - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
With the rapid advancement of technology, healthcare systems have been quickly
transformed into a pervasive environment, where both challenges and opportunities …

[HTML][HTML] SDARP: Security based Data Aware Routing Protocol for ad hoc sensor networks

KV Kumar, T Jayasankar, V Eswaramoorthy… - International Journal of …, 2020 - Elsevier
Ad hoc sensor networks are the very popular network and play a vital role for producing high
performance. In existing networks techniques has not perfectly balanced both energy and …

Signcryption method suitable for low-power IoT devices in a wireless sensor network

PY Ting, JL Tsai, TS Wu - IEEE Systems Journal, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) consists of scenarios in which real-world appliances, objects,
animals or people with unique identifiers transfer data over an insecure wireless network to …

An efficient signcryption scheme with forward secrecy based on elliptic curve

RJ Hwang, CH Lai, FF Su - Applied Mathematics and computation, 2005 - Elsevier
An efficient signcryption scheme based on elliptic curve is proposed in this paper. The
signcryption scheme combines digital signature and encryption functions. The proposed …

[HTML][HTML] Practical access control for sensor networks in the context of the Internet of Things

F Li, Y Han, C Jin - Computer Communications, 2016 - Elsevier
Wireless sensor network (WSN) plays an important role in military sensing and tracking,
target tracking, and environment monitoring. To query of the network to get useful …

Cost-effective and anonymous access control for wireless body area networks

F Li, Y Han, C Jin - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
Wireless body area networks (WBANs) are expected to play an important role in monitoring
the health information and creating a smart, reliable, and ubiquitous healthcare system. Only …