A survey on secure routing protocols for satellite network

Y Yan, G Han, H Xu - Journal of Network and Computer Applications, 2019 - Elsevier
Recently, many satellites have been launched for providing global internet broadband
service to individual consumers. As satellite networks become wide-spread, security issues …

Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises

F Alvarez, M Hollick… - 2016 IEEE Global …, 2016 - ieeexplore.ieee.org
Communications play a vital role in the response to disasters and crises. However, existing
communications infrastructure is often impaired, destroyed or overwhelmed during such …

[PDF][PDF] Trust-based secure routing against lethal behavior of nodes in wireless adhoc network.

NK Cauvery - International Journal of Electrical & Computer …, 2020 - academia.edu
Offering a secure communication in wireless adhoc network is yet an openend problem
irrespective of archives of existing literatures towards security enhancement. Inclination …

Security requirements for the deployment of services across tactical SOA

V Gkioulos, SD Wolthusen - … for Computer Network Security, MMM-ACNS …, 2017 - Springer
Abstract Service Oriented Architectures (SOA) have been identified as a suitable mediator
towards the attainment of the requirements imposed by modern warfare. Earlier studies …

Review on adaptations to AODV routing protocol to mitigate blackhole attacks in mobile ad hoc networks

R Muthaiah, T Kavitha - International Journal of Mechanical …, 2017 - sdbindex.com
Mobile ad hoc networks are self-organized, infrastructure-free network of mobile devices that
are communicating through wireless. As they do not have a central authority, it is prone to …

Secure device-to-device communication for emergency response

F Álvarez - 2020 - tuprints.ulb.tu-darmstadt.de
Mobile devices have the potential to make a significant impact during disasters. However,
their practical impact is severely limited by the loss of access to mobile communication …

AGDT: A Mathematical Model of Hybrid Algorithm for Efficient Routing in MANETs Using Dynamic Thresholds

A Kumari - Communications on Applied Nonlinear Analysis, 2024 - internationalpubls.com
Due to the high mobility of nodes in the dynamic topology of Mobile Ad Hoc Networks
(MANETs), it is challenging to define the precise position of a node in the network for …

[PDF][PDF] A novel secure routing scheme using probabilistic modelling for better resistivity against lethal attacks

J Neeli, NK Cauvery - International Journal of Electrical and Computer …, 2020 - core.ac.uk
Study towards wireless adhoc network dates two decades back with various researchers
evolving up with new solutions towards addressing its problems. Irrespective of various …

[图书][B] A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks

A Solomon - 2018 - search.proquest.com
Mobile ad hoc networks (MANETs) have experienced rapid growth in their use for various
military, medical, and commercial scenarios. This is due to their dynamic nature that enables …

[PDF][PDF] REVIEW ON MANET-APPLICATIONS AND ROUTING PROTOCOLS WITH THE DETECTION AND PREVENTION OF BLACK HOLE ATTACK

S Kumar, T Gupta - ijeast.com
MANET (Mobile Ad-Hoc Network) operates without centralized access point and physical
fixed infrastructure. MANET is considered as astatic in nature. MANETs are distributed and …