[HTML][HTML] Wormhole attack detection techniques in ad-hoc network: A systematic review

C Gupta, L Singh, R Tiwari - Open Computer Science, 2022 - degruyter.com
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can
communicate without pre-existing infrastructure. Owning to utilization of open medium …

Blockchain-assisted secure routing protocol for cluster-based mobile-ad hoc networks

N Ilakkiya, A Rajaram - International Journal of Computers …, 2023 - univagora.ro
MANETs aredecentralized network that involves mobile nodes. As the overall network is
mobile and has no centralization, network management, routing, and security become very …

Novel fuzzy based crow search optimization algorithm for secure node-to-node data transmission in WSN

SG Qureshi, SK Shandilya - Wireless personal communications, 2022 - Springer
Various sensor nodes are interconnected with each other in wireless sensor network (WSN).
WSN communicates to every node within the network wirelessly to collect data regarding the …

Energy efficient QoS aware hierarchical KF-MAC routing protocol in MANET

M Rao, N Singh - Wireless Personal Communications, 2018 - Springer
The paper proposes an energy efficient quality of services (QoS) aware hierarchical KF-
MAC routing protocol in mobile ad-hoc networks. The proposed KF-MAC (K-means cluster …

[HTML][HTML] A provably secure cluster-based hybrid hierarchical group key agreement for large wireless ad hoc networks

VS Naresh, S Reddi, NVES Murthy - Human-centric Computing and …, 2019 - Springer
Group key agreement protocol permits a set of users to create a common key to make sure
security of information exchange among members of the group. It is extensively used in …

Secure group based routing and flawless trust formulation in MANET using unsupervised machine learning approach for IoT applications

M Ponguwala, DRS Rao - EAI Endorsed Transactions on …, 2019 - publications.eai.eu
Abstract INTRODUCTION: Mobile Adhoc Network (MANET) is integrated with Internet of
Things (IoT) in many application cases due to its flexibility and scalability. The dynamic …

[HTML][HTML] Provably Secure Receiver-Unrestricted Group Key Management Scheme for Mobile Ad Hoc Networks

R Zhang, W Han, L Zhang, L Wang, X Meng - Sensors, 2023 - mdpi.com
Mobile ad hoc networks (MANETs) are self-configuring networks of wireless nodes, ie,
mobile devices. Since communications in MANETs occur via wireless channels, it is of …

A secure and receiver-unrestricted group key management scheme for mobile ad-hoc networks

W Han, R Zhang, L Zhang… - 2022 IEEE Wireless …, 2022 - ieeexplore.ieee.org
Mobile Ad-hoc Networks (MANETs) have attracted lots of concerns with its widespread use.
In MANETs, wireless nodes usually self-organize into groups to complete collaborative tasks …

[PDF][PDF] Trust in Ad Hoc Networks: A New Model Based on Clustering Algorithm.

A Mansouri, MS Bouhlel - Int. J. Netw. Secur., 2019 - ijns.jalaxy.com.tw
Abstract An Mobile Ad-hoc network (MANET) is formed when group of mobile wireless
nodes collaborate between them to communicate through wireless links in the absence of …

A secure group communication approach for tactical network environments

F Poltronieri, R Fronteddu, C Stefanelli… - 2018 International …, 2018 - ieeexplore.ieee.org
Group communication protocols that utilize multicast or local broadcast transmissions are
more efficient than point-to-point protocols when disseminating the same information to …