An approach for optimal-secure multi-path routing and intrusion detection in MANET

N Veeraiah, BT Krishna - Evolutionary Intelligence, 2022 - Springer
Mobile ad-hoc network (MANET) is dynamic in nature that is susceptible to energy and
security constraints. Among most of the existing techniques, energy optimization was a …

A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks

S Sarkar, R Datta - Ad Hoc Networks, 2016 - Elsevier
A wireless mobile ad hoc network (MANET) is an autonomous system of mobile nodes
connected by wireless links. MANET is infrastructureless and dynamic in nature. As the …

[图书][B] Network Protocols and Applications

C Wang, T Jiang, QZB Zhang - 2016 - api.taylorfrancis.com
ZigBee Network Protocols and Applications Page 1 ZigBee ® N etw ork Protocols and A
pplications Edited by Chonggang Wang • Tao Jiang • Qian Zhang ZigBee® Network Protocols …

Multilevel threshold secret sharing based on the Chinese Remainder Theorem

L Harn, M Fuyou - Information processing letters, 2014 - Elsevier
The (t, n) threshold secret sharing schemes (SSs) were introduced by Shamir and Blakley
separately in 1979. Multilevel threshold secret sharing (MTSS) is a generalization of …

Reputation-based role assignment for role-based access control in wireless sensor networks

S Misra, A Vaish - Computer Communications, 2011 - Elsevier
Wireless sensor networks (WSNs) typically consist of large number of sensor nodes, which,
depending on the application, are mostly left unattended in open environments for …

Verifiable secret sharing based on the Chinese remainder theorem

L Harn, M Fuyou, CC Chang - Security and Communication …, 2014 - Wiley Online Library
ABSTRACT A (t, n) secret sharing scheme (SS) enables a dealer to divide a secret into n
shares in such a way that (i) the secret can be recovered successfully with t or more than t …

Mobile ad hoc networks problem-a queueing approach

S Maragathasundari… - International journal of …, 2018 - inderscienceonline.com
This paper investigates a study on mobile communication network by means of queuing
theory approach. The good QOS in mobile communication network is necessary at this, the …

Multi-image steganography and authentication using crypto-stego techniques

H Sharma, DC Mishra, RK Sharma, N Kumar - Multimedia Tools and …, 2021 - Springer
It is a necessity to protect sensitive information in digital form from an adversary who may
indulge in cyber-crimes such as modification, masquerading, and replaying of data. Security …

[PDF][PDF] Weighted Secret Sharing Based on the Chinese Remainder Theorem.

L Harn, F Miao - Int. J. Netw. Secur., 2014 - Citeseer
In a),(nt secret sharing scheme (SS), a dealer divides a secret into n shares in such a way
that (a) the secret can be recovered successfully with t or more than t shares, and (b) the …

[PDF][PDF] A framework to improve the network security with less mobility in MANET

I Kaur, A Rao - Int J Comput Appl, 2017 - academia.edu
Infrastructures less network is MANET which creates the temporary network. Performance
and security are its two major issues. Due to its self organizing feature providing runtime …