[Retracted] Single‐Input Single‐Output System with Multiple Time Delay PID Control Methods for UAV Cluster Multiagent Systems

L Yan, MW Ahmad, M Jawarneh… - Security and …, 2022 - Wiley Online Library
Multiagent has become a multidomain intersecting hot issue as artificial intelligence
technology has advanced in the industrial sector. Multiagent system creation control has …

A single round-trip sip authentication scheme for voice over internet protocol using smart card

A Irshad, M Sher, E Rehman, SA Ch… - Multimedia Tools and …, 2015 - Springer
Abstract The Session Initiation Protocol (SIP) has revolutionized the way of controlling Voice
over Internet Protocol (VoIP) based communication sessions over an open channel. The SIP …

[Retracted] HGKM: An Efficient Hybrid Group Key Management for Unmanned Autonomous Vehicles MBN in Wireless Network Environment

R Mahaveerakannan, S Velmurugan… - Security and …, 2022 - Wiley Online Library
Mobile ad hoc networks (MANET) have been seen as a related advancement to Group Key
Management (GKM) applications. Remembering the true objective to guarantee amass …

[PDF][PDF] S3 (secure ship-to-ship) information sharing scheme using ship authentication in the e-navigation

S Oh, D Seo, B Lee - Int J Secur Appl, 2015 - academia.edu
Recently, the e-Navigation is main flow of worldwide maritime communications. The e-
Navigation suggested by the International Maritime Organization (IMO) and International …

Secure intrusion detection system for mobile adhoc networks

TS Bharati, R Kumar - 2015 2nd International conference on …, 2015 - ieeexplore.ieee.org
These are the networks which are formed by Mobile hand held devices like cell phones,
laptops etc. Nodes in these networks are mobile in nature. Mobile adhoc networks are very …

A user-controllable multi-layer secure algorithm for MANET

PLR Chze, WKW Yan, KS Leong - 2012 8th International …, 2012 - ieeexplore.ieee.org
This paper introduces a User-Controllable MultiLayer Secure Algorithm (UMSA) to
authenticate the MANET nodes before joining an existing MANET or formation of a new …

Mobile adhoc networks: A simulation based security evaluation and intrusion prevention

MS Al Mazrouei… - … Conference for Internet …, 2011 - ieeexplore.ieee.org
Mobile Adhoc Network is an autonomous network formed by creating nodes and
establishing wireless connections dynamically, so that messages in packets can be sent …

Hash-chain based peer-peer key management and establishment of Security Associations in MANETS

A Irshad, SM Gilani, S Khurram… - … on Information and …, 2010 - ieeexplore.ieee.org
Key management has always been an issue in ad hoc networks. These networks are
infrastructure-less which gives the attackers an open chance to intrude and operate it on …

A new Authentication Scheme for SIP Registration in a MANET Environment.

A AIT HACHA, S Bah… - International Journal of …, 2015 - search.ebscohost.com
SIP identity theft is a big issue which can be exploited by attackers to gain control of network
resources and conduct fraud using a stolen legitimate identity. This concern is more …

A secure interaction among nodes from different MANET groups using 4G technologies

A Irshad, M Shafiq, A Rahman… - 2009 International …, 2009 - ieeexplore.ieee.org
The research in mobile ad hoc networks has been gaining ground for its ease of random
deployment. There might be more than a single MANET group around, operating …