A novel energy-efficient reservation system for edge computing in 6G vehicular ad hoc network

F Javed, ZA Khan, S Rizwan, S Shahzadi… - Sensors, 2023 - mdpi.com
The roadside unit (RSU) is one of the fundamental components in a vehicular ad hoc
network (VANET), where a vehicle communicates in infrastructure mode. The RSU has …

Utilization of blockchain in e-voting system

G Pranitha, T Rukmini, TN Shankar… - 2022 2nd …, 2022 - ieeexplore.ieee.org
This paper is based on a voting system that's widely used in elections known as electronic
voting machines and has the potential to conduct the process securely by blockchain …

Energy optimization in path arbitrary wireless sensor network

BH Goud, TN Shankar, B Sah, R Aluvalu - Expert Systems, 2024 - Wiley Online Library
A network of wireless sensors is a self‐infrastructure approach with many sensory nodes.
The distributed sensory nodes communicate with each other via sensory points. In wireless …

Induction of secure data repository in blockchain over IPFS

TN Shankar, S Padhy, S Dash, MB Teja… - … on Trends in …, 2022 - ieeexplore.ieee.org
In blockchains, enormous records can't be put away effectively. From one perspective, the
blockchain becomes swollen with information that should be dispersed all through the …

Development of 6G web by Multilayer Perceptron in C-RAN for VANETs

TN Shankar, S Padhy, SM Ch, H Ravella… - 2022 IEEE Global …, 2022 - ieeexplore.ieee.org
Availability of the internet inside the moving vehicles by accessing the data from a cloud in a
radio network with the best speed according to the user's expectation is the biggest …

Digital crimes in cloud environment and the analysis via blockchain

E Muragijimana, TN Shankar, N Kumar… - 2022 IEEE 3rd …, 2022 - ieeexplore.ieee.org
In the internet era cloud via blockchain performs a vital role in the domain of Information
Technology. Cyber forensics faces several challenges in the cloud such as AWS, IBM …

[PDF][PDF] COMPARING WATCH DOG ALGORITHM AND CLASSIFICATION TECHNIQUES WITH MACHINE LEARNING TECHNIQUE TO DETECT THE VARIOUS …

LL Scientific - Journal of Theoretical and Applied Information …, 2024 - jatit.org
ABSTRACT An Intruder and Attacker are everlasting problem in the packet communication.
While facilitating communication among wireless nodes without relying on established …

[PDF][PDF] WHITE HOLE ATTACKER DETECTION IN MOBILE ADHOC NETWORK

S HEMALATHA, SM D'SOUZA, KSF AHMAD - Journal of Theoretical and …, 2024 - jatit.org
While making communication among the wireless nodes, which relies on without making
infrastructure less network are vulnerable to security fall. One of the most affecting …

Approaches of Security in Cloud Computing

DV Lakshmi, M Yaseen, K Akhil… - … on Smart Data …, 2023 - ieeexplore.ieee.org
Information integrity and secure accessibility with the various mathematical methods are
essential in the cloud environment for the creation of a protected system, which compels to …

Lightweight encryption of enterprise data and secure management of eventual graphical model construction

K Liu, L Zhu, B Xu - Applied Mathematics and Nonlinear Sciences, 2023 - sciendo.com
In this paper, we use the event map as well as the even map reaction system, combined with
the lightweight network data transmission encryption method of matrix tensor product, to …