Secured communication using virtual private network (VPN)

PJ Ezra, S Misra, A Agrawal, J Oluranti… - Cyber Security and …, 2022 - Springer
The evolution and era of the latest programs and services, collectively with the enlargement
of encrypted communications, make it difficult for site visitors within a safety enterprise …

[PDF][PDF] Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm.

K Sudharson, S Arun - Intelligent Automation & Soft Computing, 2022 - cdn.techscience.cn
Quantum Computing (QC). The content of node or sink nodes is processed using the
fundamental principles of quantum mechanics. However, cryptography techniques face …

An Optimization Framework for Data Collection in Software Defined Vehicular Networks

PADSN Wijesekara, KLK Sudheera, GGN Sandamali… - Sensors, 2023 - mdpi.com
A Software Defined Vehicular Network (SDVN) is a new paradigm that enhances
programmability and flexibility in Vehicular Adhoc Networks (VANETs). There exist different …

Wormhole attack detection techniques in ad-hoc network: A systematic review

C Gupta, L Singh, R Tiwari - Open Computer Science, 2022 - degruyter.com
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can
communicate without pre-existing infrastructure. Owning to utilization of open medium …

Analysis on essential challenges and attacks on MANET security appraisal

N Sivapriya, R Mohandas - Journal of Algebraic Statistics, 2022 - publishoa.com
One of the most important next-generation wireless network technologies is Mobile Ad Hoc
Networks (MANETs). All of the mobile nodes in the MANET are self-configurable routers that …

Fruit-fly algorithm based dynamic source routing algorithm for energy efficient multipath routing in MANET

S Venkatasubramanian - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Mobile ad hoc network (MANET) performance is critically affected by the mobility and
resource constraints of nodes. Node mobility will impact on connecting stability, and node …

Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET

A Hammamouche, M Omar, N Djebari, A Tari - Journal of information …, 2018 - Elsevier
Ad hoc network is a set of mobile nodes interconnected by wireless communication. It is
easily and less expensive to deploy, but it is vulnerable against various attacks. The node …

Improving routing disruption attack detection in MANETs using efficient trust establishment

KAP Yamini, J Stephy, K Suthendran… - Transactions on …, 2022 - Wiley Online Library
Security is a fundamental prerequisite in self‐evolvability network and providing that in any
situation is the most problematic task as the network is highly dynamic with no trusted …

[PDF][PDF] Attacks on vanet security

AN Upadhyaya, JS Shah - Int J Comp Eng Tech, 2018 - researchgate.net
ABSTRACT VANET is an emergent technology with a promising advantages but having high
challenges in its security. VANET is a self-organizing network established among vehicles …

Energy-efficient multipath routing in networking aid of clustering with OGFSO algorithm

M Rajashanthi, K Valarmathi - Soft Computing, 2020 - Springer
Networking is made out of remote mobile nodes; these nodes progressively structure a
network with no centralized controller. Due to this dynamic nature, the nodes act as routers …