[PDF][PDF] Hybrid cryptographic algorithm based key management scheme in MANET

V Alappatt, PJ Prathap - Materials Today: Proceedings, 2020 - academia.edu
abstract In the recent networking era, Mobile Adhoc Network has been popular as it
effectively solves the limitations that were pertaining with single path routers. Multi-path …

Energy efficient routing formation technique for hybrid ad hoc network using fusion of artificial intelligence techniques

SK Das, S Tripathi - International Journal of Communication …, 2017 - Wiley Online Library
Summary Hybrid Ad‐hoc NETwork (HANET) is a fusion of both the static and dynamic
topologies. Each node of this network consists of low capacity battery. Because of …

An optimal energy efficient cross-layer routing in MANETs

KS Shivakumar, VC Patil - Sustainable Computing: Informatics and …, 2020 - Elsevier
In mobile ad hoc network (MANET), battery power is a significant resource for mobile
devices. Hence conservation of energy and prolonging the network lifetime must be …

[PDF][PDF] A survey on security challenges in the current MANET routing protocols

FC Korir, W Cheruiyot - Global Journal of Engineering and …, 2022 - academia.edu
Wireless communication employs radio technology to facilitate data transmission without
any fixed infrastructures. A mobile ad hoc network is an example of this data transmission …

A secure trusted multipath routing and optimal fuzzy logic for enhancing QoS in MANETs

M Rajashanthi, K Valarmathi - Wireless Personal Communications, 2020 - Springer
Abstract Wireless Mobile Ad Hoc Network (MANET) is an independentmethod of mobile
nodes. The multipath routing in MANET is the most important pertains for securable …

Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack

D Kukreja, SK Dhurandher, BVR Reddy - Journal of Ambient Intelligence …, 2018 - Springer
A power aware detection procedure for securing mobile ad hoc networks (MANETs) against
packet forwarding misbehavior attack is introduced. Packet forwarding misbehavior attack is …

[PDF][PDF] Energy efficient hierarchical clustering using HACOPSO in wireless sensor networks

GS Pavithra, NV Babu - International Journal of Innovative …, 2019 - researchgate.net
The Wireless Sensor Network (WSN) is a collection of a various number of sensor node
involved in a tremendous region for communicating data packets from one place to another …

Failure-tolerant and low-latency telecommand in mega-constellations: The redundant multi-path routing

G Zeng, Y Zhan, X Pan - IEEE Access, 2021 - ieeexplore.ieee.org
In recent years, in order to provide worldwide broadband Internet access services, many
mega-constellation projects have been proposed. Traditional ground-based and space …

An efficient load balanced stable multi-path routing for mobile ad-hoc network

A Pal, P Dutta, A Chakrabarti, JP Singh - Microsystem Technologies, 2022 - Springer
This research aims to identify stable neighbors in a mobile ad-hoc network to create a stable
multi-path route for different mobility patterns. The other issue, this article deals with to …

Networked TT&C for mega satellite constellations: A security perspective

Y Zhan, G Zeng, X Pan - China Communications, 2022 - ieeexplore.ieee.org
Satellite constellations are promising in enabling the global Internet. However, the
increasing constellation size also complicates tracking, telemetry and command (TT&C) …