Results 91 to 100 of about 62,309 (227)
SR‐SAAD: A Social Rank‐Based Routing Protocol for Enhanced Efficiency in Delay Tolerant Networks
Traditional networks struggle with message delivery when no end‐to‐end path exists, a challenge addressed by DTNs) using social metrics in routing. The proposed SR‐SAAD protocol leverages degree centrality, social activeness, and RWE to compute a SR for selecting optimal relay nodes.
Saif Ullah +4 more
wiley +1 more source
ZSBT: A Novel Algorithm for Tracing DoS Attackers in MANETs
Denial of service (DoS) attack is a major class of security threats today. They consume resources of remote hosts or network and make them deny or degrade services for legitimate users.
Pan Yi +3 more
doaj
MANETS and Internet of Things: The Development of a Data Routing Algorithm
Internet of things (IoT), is an innovative technology which allows the connection of physical things with the digital world through the use of heterogeneous networks and communication technologies. IoT in smart environments interacts with wireless sensor
I. Alameri
semanticscholar +1 more source
A Machine Learning Approach for Secure Communication Using Blockchain for IoT‐Based VANETs
This article is based on the Secure Data communication over VANET through 5G communication. The data is handled using the Blockchain secure mechanism and Decision making is possible using Machine Learning. ABSTRACT Vehicular ad hoc networks (VANETs) have a dynamic topology. This nature makes them highly susceptible to security attacks. It also leads to
Jarallah Alqahtani +3 more
wiley +1 more source
Growing attractiveness of Mobile Ad Hoc Networks (MANETs), its features, and usage has led to the launching of threats and attacks to bring negative consequences in the society.
Anitha Veerasamy +3 more
doaj +1 more source
Performance Comparison and Evaluation of the Routing Protocols for MANETs Using NS3
MANETs (mobile ad hoc networks) contain wireless mobile nodes to construct dynamic networks without the support of fixed infrastructure. Its nodes and hosts are all movable and self-configurable while simultaneously serving as routers to deliver data ...
Yefa Mai, Yuxia Bai, Nan Wang
semanticscholar +1 more source
This paper contains the study about the advanced quality of service‐based robust multipath routing (AQRMR) protocol and its performance improvement over the previous protocol, that is, quality of service‐based robust multipath routing (QRMR) protocol.
Parveen Kumar
wiley +1 more source
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs
The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject to some unique security issues. In particular, one of the most vexing problem for MANETs security is the node capture attack: an adversary can capture a
Di Pietro Roberto +3 more
doaj +2 more sources
Analysing the Performance of a Trust-Based AODV in the Presence of a Flooding Attack
Mobile ad hoc networks (MANETs) are wireless multi-hop networks that do not rely on any fixed infrastructure, unlike traditional networks. Nodes in MANETs are formed dynamically and are free to move in any direction at variable speeds.
Ali Alzahrani, Nigel Thomas
doaj +1 more source
Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years.
B. Paramasivan, M. Kaliappan
doaj +1 more source

