MAC-AODV based mutual authentication scheme for constraint oriented networks

M Adil, R Khan, MA Almaiah, M Al-Zahrani… - Ieee …, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) is an infrastructure free organization of various
operational devices. Due to their overwhelming characteristics, these networks are used in …

Mutual authentication scheme for the device-to-server communication in the internet of medical things

J Sun, F Khan, J Li, MD Alshehri… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Medical Things (IoMT) is an application-specific extension of the generalized
Internet of Things (IoT) to ensure reliable communication among devices, designed for the …

A modified algorithm to improve security and performance of AODV protocol against black hole attack

S Shahabi, M Ghazvini, M Bakhtiarian - Wireless Networks, 2016 - Springer
Ad Hoc network is a temporal network which is managed by autonomous nodes which have
the ability to communicate with each other without having fixed network infrastructure or any …

Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET

S Gurung, S Chauhan - Wireless Networks, 2019 - Springer
The recent development in wireless communication technology and portable devices has
led to the development of Mobile Ad-Hoc Network which has unique features such as …

A Hybrid Mutual Authentication Approach for Artificial Intelligence of Medical Things

MA Jan, W Zhang, A Akbar, H Song… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Artificial Intelligence of Medical Things (AIoMT) is a hybrid of the Internet of Medical Things
(IoMT) and artificial intelligence to materialize the acquisition of real-time data via the smart …

A trustworthy, reliable, and lightweight privacy and data integrity approach for the Internet of Things

R Khan, J Teo, MA Jan, S Verma… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Data integrity and authenticity are among the key challenges faced by the interacting
devices of Internet of Things (IoT). The resource-constrained nature of sensor-embedded …

A study on improving secure routing performance using trust model in MANET

H Yang - Mobile Information Systems, 2020 - Wiley Online Library
MANET is utilized in many fields because of its advantage in quickly establishing networks.
The network will perform well if mobile nodes trust each other and act cooperatively …

Resisting blackhole attacks on MANETs

MA Abdelshafy, PJB King - 2016 13th IEEE Annual Consumer …, 2016 - ieeexplore.ieee.org
MANET routing protocols are designed based on the assumption that all nodes cooperate
without maliciously disrupting the operation of the routing protocol. AODV is a reactive …

A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities

Y Zhang, K Cheng, F Khan, R Alturki, R Khan… - Journal of Information …, 2021 - Elsevier
Abstract Internet of Things (IoT) and edge-enabled networking infrastructures have been
used to provide data processing capabilities at the edge rather than transferring it to the …

EBR: routing protocol to detect blackhole attacks in mobile ad hoc networks

D Kancharakuntla, H El-Ocla - Electronics, 2022 - mdpi.com
The presence of malevolent nodes in mobile ad hoc networks (MANETs) would lead to
genuine security concerns. These nodes may disturb the routing process or deform the …