A Secure Data Dissemination in a DHT‐Based Routing Paradigm for Wireless Ad Hoc Network

R Kousar, M Alhaisoni, SA Akhtar… - Wireless …, 2020 - Wiley Online Library
Over the past decade, distributed hash table‐(DHT‐) based routing protocols have been
adopted in wireless ad hoc networks (WANETs) to achieve scalability in the route discovery …

Secure routing in MANETS using adaptive cuckoo search and entropy based signature authentication

S Aluvala, K Rajasekhar - Wireless Personal Communications, 2023 - Springer
Abstract MANET (Mobile Ad hoc Network) is a collection of self-organizing mobile nodes that
operate independently of centralized administration or existing infrastructure. MANETs are …

Secure Door on Cloud: A Secure Data Transmission Scheme to Protect Kafka's Data

H Zhang, L Fang, K Jiang, W Zhang… - 2020 IEEE 26th …, 2020 - ieeexplore.ieee.org
Apache Kafka, which is a high-throughput distributed message processing system, has been
leveraged by the majority of enterprise for its outstanding performance. Unlike common …

Enhanced Detection and Elimination Mechanism from Cooperative Black Hole Threats in MANETs

S Khan, F Usman, FK Khalil - International Journal of …, 2018 - search.proquest.com
Malicious node invasion as black hole attack is a burning issue in MANETs. Black hole
attacks with a single malicious node is easy to detect and prevent. The collaborative attacks …

A Defense Mechanism Based on Improved Allocation Strategy of VMs Co-Resident Attack in Power Cloud Platform

Y Li, P Zhang, D Li, J Zeng - Recent Advances in Computer …, 2021 - ingentaconnect.com
Background: Cloud platform is widely applied in the field of electric power. Virtual machine
co-resident attack is one of the fundamental security threats to the existing power cloud …

Assessment of Beer-Quiché Algorithm with Minmax-Q for Stochastic Multipath Routing in Mobile Ad-Hoc Network

D Sathiya, B Gomathy - Journal of Computational and …, 2018 - ingentaconnect.com
In an Adhoc, the attackers try to interrupt the data packets being broadcasted in the network
between the nodes, which travels from source to destination. To solve this problem, analysis …

[PDF][PDF] Research Article A Secure Data Dissemination in a DHT-Based Routing Paradigm for Wireless Ad Hoc Network

R Kousar, M Alhaisoni, SA Akhtar, N Shah, A Qamar… - 2020 - academia.edu
Over the past decade, distributed hash table-(DHT-) based routing protocols have been
adopted in wireless ad hoc networks (WANETs) to achieve scalability in the route discovery …