Implementation of trust-based novel approach for security enhancements in MANETs

MS Usha, KC Ravishankar - SN Computer Science, 2021 - Springer
MANET is completely a unique, self-sustained wireless communication network. It can be
created when necessary without any infrastructural support. Mobile ad hoc networks …

[PDF][PDF] Secure data transfer in manet with key calculator and key distributer using cryptography methods

YK Alapati, S Ravichandran - International Journal of Safety and …, 2020 - academia.edu
Accepted: 10 June 2020 A Mobile Ad Hoc Network (MANET) is combined with number of
versatile nodes that can communicate with one another without having any predefined …

[PDF][PDF] Survey on Identifying Packet Misbehavior in Network Virtualization

S Reshmi, MA Kumar - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
Abstract Background/Objectives: The pros in using network virtualization for the users and
the resources offers effectual, meticulous, and protected sharing of the networking …

[PDF][PDF] Study for routing algorithm and coverage rate of nano-satellite constellation

Y Shi, X Jiang, P Zhu, Y Zhang - journal.it.cas.cz
According to the constellation of Nano-satellite has become development tendency. this
paper studies its coverage rate and the routing algorithm for its high rate network in polar …

[PDF][PDF] Year of Publication: 2016

P Singh, N Sharma - Communications, 2016 - academia.edu
Cyber security is a critical issue now a days in various different domains in different
disciplines. This paper presents a review analysis of cyber hacking attacks along with its …

[引用][C] AODV vs. OLSR: An Analytical Approach to Study Black Hole Attack

DCS Singh, D Choudhary - Int. J. Comput. Appl, 2017

[引用][C] Secure Data Transfer in Manet with Key Calculator and Key Distributer Using Cryptography Methods Secure Data Transfer in Manet with Key Calculator and …