This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public …
Y Xu, J Liu, Y Shen, J Liu, X Jiang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
This article focuses on the secure routing problem in the decentralized Internet of Things (IoT). We consider a typical decentralized IoT scenario composed of peer legitimate devices …
W Liu, M Yu - IEEE transactions on vehicular technology, 2014 - ieeexplore.ieee.org
Anonymous communications are important for many of the applications of mobile ad hoc networks (MANETs) deployed in adversary environments. A major requirement on the …
P Satyanarayana, G Diwakar, BV Subbayamma… - Computer …, 2023 - Elsevier
Abstract “Mobile Ad Hoc Network (MANET)” is a self-configurable, self-repairing, self- maintaining, highly mobile, decentralized, and independent wireless network, which has the …
We address pairwise and (for the first time) triple key establishment problems in wireless sensor networks (WSN). Several types of combinatorial designs have already been applied …
With the development of wireless technology, two basic wireless network models that are commonly used, known as infrastructure and wireless ad hoc networks (WANETs), have …
FS Al-Anzi - Digital Communications and Networks, 2022 - Elsevier
Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless networks. Wireless mesh networking technology has been pivotal in providing an affordable …
T Lu, Z Du, ZJ Wang - IEEE Access, 2019 - ieeexplore.ieee.org
The popularity of Internet applications has made communication privacy an increasingly important security requirement. As an important aspect of privacy, anonymity ensures that a …
M Singh, J Sharma - Proceedings of 3rd International …, 2014 - ieeexplore.ieee.org
The main idea behind this paper is to convert the on-demand single path routing protocol into proactive multipath routing protocol in terms of predicting the link failure by utilizing the …