A Review: An Efficient and Reliable Secure Routing Mechanism with the Prevention of Attacks in Mobile Ad-Hoc Network (MANET)

KS Prasanna, B Ramesh - Wireless Personal Communications, 2023 - Springer
In wireless communication systems, Wireless ad hoc network plays a significant role in the
research domain. MANET is also an ad hoc network that build a temporary network to …

A secured trusted routing using the structure of a novel directed acyclic graph-blockchain in mobile ad hoc network internet of things environment

N Ilakkiya, A Rajaram - Multimedia Tools and Applications, 2024 - Springer
In the contemporary technology context, several physical things may be used to support
human activities. The Internet of Things is a cutting-edge technology solution that is used to …

Deployment of efficient MANET testbed using aggregation based archive population optimization

RS Janani, R Asokan - Biomedical Signal Processing and Control, 2024 - Elsevier
In today's 6G era, Mobile ad hoc networks (MANETs) have been enhanced by rapid
technological advancement in the wireless communication industry to better support a wide …

2-layer classification model with correlated common feature selection for intrusion detection system in networks

S Patthi, S Singh, ICK P - Multimedia Tools and Applications, 2024 - Springer
The proliferation of wireless networks as a primary data transmission channel has brought
about a surge in data volume but also raised security threats and privacy concerns. Intrusion …

TrustOpt: An optimized trust-based approach for integrated attacks in MANETs

MK Brar, S Singh, S Singh - 2024 2nd International Conference …, 2024 - ieeexplore.ieee.org
The dynamic and decentralized nature of mobile adhoc networks (MANETs) made it
challenging for a network to protect it from intruders so, security is the prominent challenge …

Chinese Remainder Theorem-Based Encoding of Text to Point Elliptic Curve Cryptography

MS Christo - Journal of Advanced Research in Applied …, 2024 - semarakilmu.com.my
One of the most crucial requirements in this digital age is data security. The number of data
usage increased drastically now a days, but how far the data is secured is the very big …