Prominent unicast routing protocols for Mobile Ad hoc Networks: Criterion, classification, and key attributes

TK Saini, SC Sharma - Ad Hoc Networks, 2019 - Elsevier
Abstract Mobile Ad hoc Networks are decentralized networks in which participating nodes
are mobile, small form-factor, equipped with the wireless interface, and have forwarding …

Identity-based cryptography techniques and applications (a review)

D Anand, V Khemchandani… - 2013 5th international …, 2013 - ieeexplore.ieee.org
This paper is reviewed the state of research on the important topic in the field of information
interchange that is identity based cryptography which more or less extention of the public …

Incentive jamming-based secure routing in decentralized internet of things

Y Xu, J Liu, Y Shen, J Liu, X Jiang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
This article focuses on the secure routing problem in the decentralized Internet of Things
(IoT). We consider a typical decentralized IoT scenario composed of peer legitimate devices …

AASR: authenticated anonymous secure routing for MANETs in adversarial environments

W Liu, M Yu - IEEE transactions on vehicular technology, 2014 - ieeexplore.ieee.org
Anonymous communications are important for many of the applications of mobile ad hoc
networks (MANETs) deployed in adversary environments. A major requirement on the …

Comparative analysis of new meta-heuristic-variants for privacy preservation in wireless mobile adhoc networks for IoT applications

P Satyanarayana, G Diwakar, BV Subbayamma… - Computer …, 2023 - Elsevier
Abstract “Mobile Ad Hoc Network (MANET)” is a self-configurable, self-repairing, self-
maintaining, highly mobile, decentralized, and independent wireless network, which has the …

Pairwise and triple key distribution in wireless sensor networks with applications

S Ruj, A Nayak, I Stojmenovic - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
We address pairwise and (for the first time) triple key establishment problems in wireless
sensor networks (WSN). Several types of combinatorial designs have already been applied …

Channel contention‐based routing protocol for wireless ad hoc networks

N Mast, MA Khan, MI Uddin, SA Ali Shah, A Khan… - …, 2021 - Wiley Online Library
With the development of wireless technology, two basic wireless network models that are
commonly used, known as infrastructure and wireless ad hoc networks (WANETs), have …

[HTML][HTML] Design and analysis of intrusion detection systems for wireless mesh networks

FS Al-Anzi - Digital Communications and Networks, 2022 - Elsevier
Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless
networks. Wireless mesh networking technology has been pivotal in providing an affordable …

A survey on measuring anonymity in anonymous communication systems

T Lu, Z Du, ZJ Wang - IEEE Access, 2019 - ieeexplore.ieee.org
The popularity of Internet applications has made communication privacy an increasingly
important security requirement. As an important aspect of privacy, anonymity ensures that a …

Performance analysis of secure & efficient AODV (SE-AODV) with AODV routing protocol using NS2

M Singh, J Sharma - Proceedings of 3rd International …, 2014 - ieeexplore.ieee.org
The main idea behind this paper is to convert the on-demand single path routing protocol
into proactive multipath routing protocol in terms of predicting the link failure by utilizing the …