An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol [PDF]
In this paper, we address the problem of cooperative black hole attack, one of the major security issues in mobile ad hoc networks. The aim of this attack is to force nodes in the network to choose hostile nodes as relays to disseminate the partial ...
Soufiene Djahel+2 more
openalex +2 more sources
An optimized link state routing protocol for real-time application over Vehicular Ad-hoc Network
Mohammed Elaryh Makki Dafalla+5 more
openalex +2 more sources
SECURITY ISSUES IN THE OPTIMIZED LINK STATE ROUTING PROTOCOL VERSION 2 (OLSRV2) [PDF]
Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city-wide community-networks are emerging, connecting regular Internet ...
Ulrich Herberg, Thomas Clausen
openalex +2 more sources
An Optimized Link State Routing Protocol with a Blockchain Framework for Efficient Video-Packet Transmission and Security over Mobile Ad-Hoc Networks [PDF]
A mobile ad-hoc network (MANET) necessitates appropriate routing techniques to enable optimal data transfer. The selection of appropriate routing protocols while utilizing the default settings is required to solve the existing problems.
Huda A. Ahmed, Hamid Ali Abed AL-Asadi
doaj +2 more sources
LSGO: Link State aware Geographic Opportunistic routing protocol for VANETs [PDF]
Robust and efficient data delivery in vehicular ad hoc networks (VANETs) with high mobility is a challenging issue due to dynamic topology changes and unstable wireless links.
Xuelian Cai+4 more
openalex +2 more sources
Disaster scenario optimised link state routing protocol and message prioritisation [PDF]
Natural and artificial (human‐made) disasters have been steadily increasing all over the world, signifying the importance of providing reliable and energy friendly communication network to survivors in the aftermath of a disaster.
Umar Aliyu+4 more
doaj +2 more sources
Digital radiography image quality evaluation using various phantoms and software
Abstract Purpose To investigate the effect of the exposure parameters on image quality (IQ) metrics of phantom images, obtained automatically using software or from visual evaluation. Methods Three commercial phantoms and a homemade phantom constructed according to the instructions given in the IAEA Human Health Series No.
Ioannis A. Tsalafoutas+4 more
wiley +1 more source
MANET (Mobile Ad hoc Networks) functionality is determined by routing protocols’ ability to adjust to atypical changes in information and communication technologies, topological systems, and connection status.
Jaspreet Singh+4 more
semanticscholar +1 more source
All-Path Bridging: Path Exploration Protocols for Data Center and Campus Networks [PDF]
Today, link-state routing protocols that compute multiple shortest paths predominate in data center and campus networks, where routing is performed either in layer three or in layer two using link-state routing protocols.
Arco Rodríguez, José Manuel+6 more
core +4 more sources
Beaconless Traffic-Aware Geographical Routing Protocol for Intelligent Transportation System
Intelligent Transportation System (ITS) in sustainable smart cities are taking advantage of moving vehicle nodes for data communication. VANETs support many applications related to safety, infotainment, and accident detection.
Sadia Din+5 more
doaj +1 more source