J Sun, F Khan, J Li, MD Alshehri… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Medical Things (IoMT) is an application-specific extension of the generalized Internet of Things (IoT) to ensure reliable communication among devices, designed for the …
S Shahabi, M Ghazvini, M Bakhtiarian - Wireless Networks, 2016 - Springer
Ad Hoc network is a temporal network which is managed by autonomous nodes which have the ability to communicate with each other without having fixed network infrastructure or any …
The recent development in wireless communication technology and portable devices has led to the development of Mobile Ad-Hoc Network which has unique features such as …
MA Jan, W Zhang, A Akbar, H Song… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Artificial Intelligence of Medical Things (AIoMT) is a hybrid of the Internet of Medical Things (IoMT) and artificial intelligence to materialize the acquisition of real-time data via the smart …
Data integrity and authenticity are among the key challenges faced by the interacting devices of Internet of Things (IoT). The resource-constrained nature of sensor-embedded …
H Yang - Mobile Information Systems, 2020 - Wiley Online Library
MANET is utilized in many fields because of its advantage in quickly establishing networks. The network will perform well if mobile nodes trust each other and act cooperatively …
MA Abdelshafy, PJB King - 2016 13th IEEE Annual Consumer …, 2016 - ieeexplore.ieee.org
MANET routing protocols are designed based on the assumption that all nodes cooperate without maliciously disrupting the operation of the routing protocol. AODV is a reactive …
Y Zhang, K Cheng, F Khan, R Alturki, R Khan… - Journal of Information …, 2021 - Elsevier
Abstract Internet of Things (IoT) and edge-enabled networking infrastructures have been used to provide data processing capabilities at the edge rather than transferring it to the …
D Kancharakuntla, H El-Ocla - Electronics, 2022 - mdpi.com
The presence of malevolent nodes in mobile ad hoc networks (MANETs) would lead to genuine security concerns. These nodes may disturb the routing process or deform the …