Results 31 to 40 of about 70,985 (214)

An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Wireless and mobile sensor network technologies in M2M (machine to machine) are rapidly applied to our real life. Thus, in near future, advanced wireless and mobile sensor network in M2M application will be major key factor of the future generation ...
You-Boo Jeon   +3 more
doaj   +1 more source

Secure Routing in Wireless Mesh Networks [PDF]

open access: yes, 2011
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers ...
Sen, Jaydip
core   +3 more sources

A Secure and Efficient Certificateless Authentication Scheme With Unsupervised Anomaly Detection in VANETs

open access: yesIEEE Access, 2018
As the crucial component of intelligent transportation system, vehicular ad hoc networks (VANETs) are capable of providing a variety of safety-related functionalities and commercial-oriented applications, which significantly improves the driving ...
Haowen Tan, Ziyuan Gui, Ilyong Chung
doaj   +1 more source

Queue utilization with hop based enhanced arbitrary inter frame spacing MAC for saturated ad HOC networks [PDF]

open access: yes, 2015
© 2015 IEEE. Path length of a multi hop Ad Hoc networks has an adverse impact on the end-to-end throughput especially during network saturation. The success rate of forwarding packets towards destination is limited due to interference, contention ...
Ghita, B., Lancaster, D., Marchang, Jims
core   +1 more source

A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]

open access: yes, 2010
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu   +4 more
core   +1 more source

Traffic agents for improving QoS in mixed infrastructure and ad hoc modes wireless LAN [PDF]

open access: yes, 2006
As an important complement to infrastructured wireless networks, mobile ad hoc networks (MANET) are more flexible in providing wireless access services, but more difficult in meeting different quality of service (QoS) requirements for mobile customers ...
A Hills   +17 more
core   +2 more sources

A Neighbor Trust Weight Based Cryptography for Multi Key Distribution for Improving Quality of Service in MANETS

open access: yesIngénierie des Systèmes d'Information, 2022
A Mobile Ad-Hoc Network (MANET) is a self-configuring network that provides temporary connections to several wireless nodes. Trust mechanisms are employed in routing protocols to quickly locate a safe path.
Rajesh Yamparala   +1 more
semanticscholar   +1 more source

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Experimentation with MANETs of Smartphones

open access: yes, 2017
Mobile AdHoc NETworks (MANETs) have been identified as a key emerging technology for scenarios in which IEEE 802.11 or cellular communications are either infeasible, inefficient, or cost-ineffective.
Aguiar, Ana   +3 more
core   +1 more source

A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks

open access: yes, 2010
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs).
Meghanathan, Natarajan   +1 more
core   +2 more sources

Home - About - Disclaimer - Privacy