We designed and implemented the ECA (Event Condition Action) based Multicast Ad hoc On-demand Distance Vector (ECA-MAODV) routing protocol for the ubiquitous network. The …
To sustain the security services in a Mobile Ad Hoc Networks (MANET), applications in terms of confidentially, authentication, integrity, authorization, key management, and abnormal …
SK Arora, S Vijan, GS Gaba - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
Abstract Mobile Ad-hoc Network (MANET) has no clear line of defense; ie, no built-in security. Black hole attack found in network layer pretends that it has a shortest route to …
Y Fu, G Li, A Mohammed, Z Yan… - 2019 IEEE SmartWorld …, 2019 - ieeexplore.ieee.org
Mobile AdHoc Networks (MANET) can be fast implemented, and it is very popular in many specific network requirements, such as UAV (Unmanned Aerial Unit), Disaster Recovery and …
Vehicular ad-hoc network (VANET) considers as a promising technology to support the communication between vehicles, and between vehicles and road side units. A reliable …
R Chaudhary, PR Ragiri - … of the Second International Conference on …, 2016 - dl.acm.org
MANET (Mobile ad-hoc network) is a wireless network. Several mobile nodes are present in MANET. It has various applications ranging from military to remote area communication …
TE Fogwell, EO Ochola - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Mobility and portability of wireless communication devices in Mobile Ad Hoc Networks have introduced data security threats. This is due to the utilization of multiple hops as a result of …
AR Mahlous - International Journal on Information …, 2019 - search.ebscohost.com
Abstract Mobile Ad Hoc Networks (MANETs) are an interconnected system of wireless nodes without any central administration, making them more vulnerable to attacks than their …
TE Fogwell, EO Ochola - International Conference on Cyber …, 2019 - search.proquest.com
Data security threats have been introduced in Mobile Ad Hoc Networks due to the mobility and portability of the wireless communication devices. These threats are due to the …