Enabling security in MANETs using an efficient cluster based group key management with elliptical curve cryptography in consort with sail fish optimization algorithm

C Shanmuganathan, K Boopalan… - Transactions on …, 2023 - Wiley Online Library
In MANET, group key management is a vital part of multicast security. But distribution of keys
in an authenticated manner is a difficult task in group key management. The existing …

TACR: Trust aware clustering-based routing for secure and reliable VANET communications

MV Kadam, VM Vaze, SR Todmal - Wireless Personal Communications, 2023 - Springer
Achieving security and privacy preservation considering the network dynamics and
overhead is a vital research problem. Long-distance communications in highly dynamic …

An Enhanced Location-Aided Ant Colony Routing for Secure Communication in Vehicular Ad Hoc Networks

R Ramamoorthy - Human-Centric Intelligent Systems, 2024 - Springer
The dynamic characteristics of vehicular ad hoc networks (VANETs) demand reliable and
secure communication over wireless media. However, there are significant contradictions in …

[HTML][HTML] Trust aware fuzzy clustering based reliable routing in Manet

CE Singh, SS Priya, BM Kumar, K Saravanan… - Measurement …, 2024 - Elsevier
Abstract Mobile Ad Hoc Network (MANET) is a wireless ad hoc network that can be routed
over a Link Layer Ad Hoc network. In a MANET, nodes are able to freely and adaptably …

Cluster-based multiple malicious node detection using honeypot-AODV in MANETs

HK Sampada, KR Shobha - International Journal of …, 2024 - inderscienceonline.com
Security and scalability are two major research areas in the field of mobile ad-hoc networks
(MANETs). The existing solutions for security and scalability are majorly used for static …

Email Protection in the Digital Age: Evaluating Symmetric Cryptographic Algorithms

V Sangeetha, KS Rokhade… - … on Intelligent and …, 2024 - ieeexplore.ieee.org
Nowadays, digital data interaction plays an increasingly pivotal role across various
industries. Ensuring the security of information during data storage and transmission is of …