Results 1 to 10 of about 62,290 (208)

Provably Secure Receiver-Unrestricted Group Key Management Scheme for Mobile Ad Hoc Networks [PDF]

open access: yesSensors, 2023
Mobile ad hoc networks (MANETs) are self-configuring networks of wireless nodes, i.e., mobile devices. Since communications in MANETs occur via wireless channels, it is of significance to secure communications among wireless and mobile nodes.
Rui Zhang   +4 more
doaj   +2 more sources

Multipath Routing and MPTCP-Based Data Delivery Over Manets

open access: yesIEEE Access, 2020
In some special circumstances (e.g., tsunamis, battlefields, and earthquakes), communication infrastructures are damaged or nonexistent. For communication among people, mobile smart devices (MSDs) can be used to construct mobile ad hoc networks (MANETs).
Tongguang Zhang, Shuai Zhao, Bo Cheng
doaj   +2 more sources

Quantitative Study on the Impact of Energy Consumption Based Dynamic Selfishness in MANETs [PDF]

open access: yesSensors, 2021
Cooperative communication and resource limitation are two main characteristics of mobile ad hoc networks (MANETs). On one hand, communication among the nodes in MANETs highly depends on the cooperation among nodes because of the limited transmission ...
Axida Shan   +4 more
doaj   +2 more sources

A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks [PDF]

open access: yesSensors, 2022
The distributed nature of mobile ad hoc networks (MANETs) presents security challenges and vulnerabilities which sometimes lead to several forms of attacks.
Eric Chiejina   +4 more
doaj   +2 more sources

Self-Organization Based Clustering in MANETs Using Zone Based Group Mobility

open access: yesIEEE Access, 2017
The dynamic network topology and mobile nature of nodes can cause challenges regarding connectivity and routing. Clustering in mobile ad-hoc networks (MANETs) is one of the effective ways to organize a network according to the network topological changes.
Farooq Aftab   +2 more
doaj   +2 more sources

Dynamic Address Routing for Adhoc & Mesh Networks using MANETs [PDF]

open access: yesE3S Web of Conferences, 2021
The organization ought to have the option to adaptively change the directing ways to lighten any of these impacts. In addition, in a tactical climate, protection of safety, inertness, dependability, deliberate sticking, and recuperation from ...
Tummala Indira Priyadarshini   +1 more
doaj   +1 more source

Power Adjustment Algorithm for Higher Throughput in Mobile Ad-Hoc Networks [PDF]

open access: yesE3S Web of Conferences, 2021
In Mobile Ad Hoc Networks (MANETs), power control is necessary in order to reduce power consumption rates, avoid collisions within packets, increase spatial throughput of the system and to reduce contention among flows.
Saravanan K.   +4 more
doaj   +1 more source

Survey Based on Security Aware Caching Scheme for IoT Based Information Centric Networking [PDF]

open access: yesEAI Endorsed Transactions on Energy Web, 2021
Information-Centric Networking (ICN) empowered by information-centric paradigm takes popular paradigm place of host-centric networking of communication networks, which in turn helps prioritizing the labeled content delivery ...
M. Sakthivanitha, S. Saradha
doaj   +1 more source

E-CREDND Scheme for Detection of malevolent nodes in Ad-hoc Network [PDF]

open access: yesEAI Endorsed Transactions on Mobile Communications and Applications, 2021
The remote network that comprises of multipurpose nodes and is infrastructure-less in nature is mobile ad-hoc network(MANET). It powerfully self-composes in subjective and impermanent system topologies.
Shilpi Shilpi, Danish Rizvi
doaj   +1 more source

Klasifikacija MANET protokola rutiranja / Classification of MANET routing protocols / Классификация протоколов маршрутизации «MANET»

open access: yesVojnotehnički Glasnik, 2015
Mobilne ad hoc mreže (MANET) jesu samokonfigurišuće mreže čvorova povezanih bežičnim vezama bez bilo kakvog oblika centralizovanog upravljanja. Trenutno su jedan od najvažnijih istraživačkih predmeta zbog velikog broja različitih primena (vojna ...
Dejan M. Tepšić, Mladen Đ. Veinović
doaj   +2 more sources

Home - About - Disclaimer - Privacy