A study on hierarchical structure and blockchain-based node authentication mechanism in manet

H Yang - Convergence Security Journal, 2019 - koreascience.kr
MANET has many security vulnerabilities because it consists of only mobile nodes using
wireless. In particular, it is a very important factor determining network performance that …

Eavesdropper-Tolerance Capability in Two-HopWireless Networks via Cooperative Jamming.

Y Zhang, Y Shen, J Zhu, X Jiang - Adhoc & Sensor Wireless …, 2015 - search.ebscohost.com
Two-hop relay wireless network serves as an important network model for the performance
study of general wireless networks, while cooperative jamming has been a promising …

Modeling and structural analysis of organic field effect transistor

B Kumar, P Mittal, S Saxena, BK Kaushik… - 2012 International …, 2012 - ieeexplore.ieee.org
This paper proposes an analytical model for bottom gate structures of Organic Field Effect
Transistors (OFETs). Structural analysis and significant advantages of top contact over …

[PDF][PDF] A performance study of various security attacks on aodv routing protocol in manet

K Singh, S Rani - International Journal of Computer Applications, 2014 - researchgate.net
ABSTRACT Mobile Ad-hoc Network (MANET) is a self-configuring wireless network of
movable and independent nodes which operate without the support of any permanent …

Optimizing router and security mechanism in AD HOC networks

BAAA Al-Nissan - 2022 - openaccess.altinbas.edu.tr
As a result of the novel qualities of versatile impromptu organizations, the significant issues
to consider while planning a steering convention are security and organization execution. As …

[PDF][PDF] Hybrid Technique (AES-ECC) Used to Improve Network Performance in Mobile Ad Hoc Network

N Gupta, D Prakash - 2019 - academia.edu
Mobile ad-hoc networks (MANET) and wireless sensor networks are the main applications of
wireless networks. With the use of mobile nodes, a new technology which can go …

[PDF][PDF] Performance Analysis of MANET Reactive Routing under Security

K Sreenivasulu, EV Prasad… - International Journal of …, 2012 - Citeseer
Security is an essential service for wired and wireless network communications. The
success of mobile ad hoc networks (MANET) mainly depends on people's confidence in its …

MIMO wiretap channels with randomly located eavesdroppers: Large-system analysis

MA Girnyk, F Gabry, M Vehkaperä… - 2015 IEEE …, 2015 - ieeexplore.ieee.org
Security issues in wireless networks have become a subject of growing interest in recent
years due to the broadcast nature of wireless channels. In this paper, we investigate secure …

[PDF][PDF] An Efficient Scheme for Detection and Prevention of Black Hole Attack using Multipath AODV in Mobile ad-hoc Network

J Chaturvedi, R Sharma - 2021 - academia.edu
In the study many techniques were introduced by researchers to find the attacks in the
MANETs. In this work we have found an approach to remove black hole attack operations …

[PDF][PDF] Secure protocol design for mobile Ad Hoc Networks

李笑晨 - 2020 - fun.repo.nii.ac.jp
Secure Protocol Design for Mobile Ad Hoc Networks Page 1 Secure Protocol Design for Mobile
Ad Hoc Networks by Xiaochen Li A dissertation submitted in partial fulfillment of the requirements …