Due to the lack of centralized identity management and the broadcast nature of wireless ad hoc networks, identity attacks are always tempting. The attackers can create multiple …
H Yang, Z Li, Z Liu - Journal of Ambient Intelligence and Humanized …, 2019 - Springer
The performance of routing protocols determines the performance of MANET, and the development and improvement of routing protocols have been the hotspot of MANET …
Real-time and ubiquitous patient monitoring demands the use of wireless data acquisition through resource constrained medical sensors, mostly configured with No-input No-output …
K Saleem, Z Tan, W Buchanan - Health 4.0: How Virtualization and Big …, 2017 - Springer
The great leap forward of cyber-physical systems has made provision for future personalized medicine. However, these systems are prone to cyber attacks. To provide patients with …
A mobile ad hoc network (MANET) is composed of a set of free and mobile nodes connected on an ad hoc basis. They form a temporary dynamic wireless network without any …
O Moradipour, M Fathi - International Journal of Wireless Information …, 2020 - Springer
Dynamic variation of network topology in mobile ad hoc networks (MANET) forces network nodes to work together and rely on each other for routing. Considering the lack of a central …
Because of the absence of central control and limited capabilities of tiny nodes in mobile ad hoc networks (MANETs), these types of networks are always vulnerable to different kind of …
I Nausheen, A Upadhyay - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
The mobile nodes or systems in mobile ad hoc networks wirelessly transmit binary data. The topology of the network is dynamic. Therefore, because of the network's wireless nature …
AT Kolade, MF Zuhairi, E Yafi, CL Zheng - Proceedings of the 11th …, 2017 - dl.acm.org
The underlying element that supports the device communication in the MANET is the wireless connection capability. Each node has the ability to communicate with other nodes …