We propose a coding scheme based on the combination of interleaving with systematic channel codes for secrecy. The basic idea consists of generating a random interleaving key …
X Li, Y Zhang, S Zhao, Y Shen, X Jiang - Ad Hoc Networks, 2018 - Elsevier
The secrecy throughput capacity (STC) performance study of mobile ad hoc networks (MANETs) is critical for supporting their applications in security-sensitive scenarios. Despite …
KR Shibu, R Suji Pramila - Wireless Personal Communications, 2021 - Springer
Automatic key establishment schemes are the root of secure communication in Mobile adhoc networks (MANETs). These schemes are not universal, their performance depends …
J Zhu, Y Chen, Y Shen, O Takahashi, X Jiang… - Ad hoc networks, 2014 - Elsevier
This paper considers the transmission of confidential messages over noisy wireless ad hoc networks, where both background noise and interference from concurrent transmitters affect …
Modern distributed wireless edge networks, such as Internet of Things (IoT), data center, cloud systems with wireless edges and mobile devices, and so on, represent one of the most …
Retraction:“Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimization algorithm in MANETs” by authors …
X Cao, J Zhang, L Fu, W Wu… - IEEE/ACM Transactions …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the impact of information-theoretic secrecy constraint on the capacity and delay of mobile ad hoc networks (MANETs) with mobile legitimate nodes and …
This paper analyzes the secrecy transmission capacity (STC) over wireless ad hoc networks, where the legitimate nodes and eavesdroppers are distributed as Poisson point process. We …
T Lathies Bhasker - Economy of Industry, 2013 - search.ebscohost.com
The mobile Ad-hoc networks (MANET) are wireless networks which utilize mobile nodes for communicating among them and in the external transmission range. The vulnerable nature …