wireless adhoc networks
Recently Published Documents


TOTAL DOCUMENTS

61
(FIVE YEARS 12)

H-INDEX

6
(FIVE YEARS 3)

2020 ◽  
Vol 66 (12) ◽  
pp. 7684-7701
Author(s):  
Kang-Hee Cho ◽  
Si-Hyeon Lee ◽  
Vincent Y. F. Tan

2020 ◽  
Vol 2 (2) ◽  
pp. 83-95
Author(s):  
Dr. Subarna Shakya

The adhoc networks are the platforms formed for specific reason to attain a specific purpose. It is a communication strategy followed by the wireless devices when or while the actual communication setup is not possible. Any portable device communicating in the wireless medium in a decentralized manner is termed to be a wireless adhoc network. One such device is the wireless-sensors that imitate the aforementioned procedures to send the information from the source to the target falls under the category of the wireless adhoc network, as it communicates through the air in a wireless medium. The rapid proliferation of sensors and growing demand for applications and services from the network formed using such wireless-sensors generate unrivaled appeals for routing data packets on infrastructure of the network formed using the wireless-sensors. Such sensors lays as the fundamental devices in a wide range application and are even more predominant in the internet of things paradigm. Numerous of such devices are used in the internet of things to gather enormous amount of data from a broad range of applications. The sensors used in the internet of thing usually performs the sensed data transmission to the gateway-nodes through the public channel that are insecure for conversing the confidential data. So the routing with authentication becomes essential, to make the routing robust and long lasting it is necessary to develop a light weight authentication scheme that does not consume too much of the energy of the network of the wireless-sensors. To handle this problem the paper concatenates the unique key generation technique the mid-square (Mid-S) with the Beziers curve based authentication (UKHA) to secure and authenticate the routing between the wireless-sensor networks framed in adhoc manner and the gate way nodes of the internet of things platform. The proposed protocol for routing is develop in the MATLAB and simulated in it to manifest the proficiency of the developed protocol on the terms of the energy consumption, packet deliver rate, percentage of losses incurred and running time.


2020 ◽  
Vol 154 ◽  
pp. 501-508 ◽  
Author(s):  
Amin Salih Mohammed ◽  
Saravana Balaji B ◽  
Saleem Basha M S ◽  
Asha P N ◽  
Venkatachalam K

Cryptography ◽  
2020 ◽  
pp. 72-97 ◽  
Author(s):  
Erukala Suresh Babu ◽  
C. Nagaraju ◽  
M.H.M. Krishna Prasad

Secure communication is one of the basic requirements for any network standard. Particularly, cryptographic algorithms have gained more popularity to protect the communication in a hostile environment. As the critical information that is being transferred over the wireless adhoc networks can be easily acquired and is vulnerable to many security attacks. However, several security communication threats had been detected and defended using conventional symmetric and asymmetric cryptographic mechanism, which are too difficult and resource consuming for such mobile adhoc networks. Recently, one of the severe security threats that have to be detected and defend in any type of network topology is blackhole attack and cooperative blackhole. Because of its severity, the black hole attack has attracted a great deal of attention in the research community. Comprehensively the results of the existing system conclude that the black hole attack on various mobile adhoc networks is hard to detect and easy to implement. This paper addresses to detect and defend the blackhole attack and cooperative blackhole attack using hybrid DNA-based cryptography (HDC) mechanism. Moreover, the proposed method upsurge the security issue with the underlying AODV routing protocol. Eventually, This Hybrid DNA-based Cryptography (HDC) is one of the high potential candidates for advanced wireless ad hoc networks, which require less communication bandwidth and memory in comparison with other cryptographic systems. The simulation results of this proposed method provide better security and network performances as compared to existing schemes.


Author(s):  
Sivaganesan D.

The vehicle-Adhoc Networks are the specific type wireless adhoc networks, framed using the group of vehicles supporting the “on the fly’ communication between vehicles on the roadside. This is basically developed to handle the traffic in an intelligent manner avoiding the unnecessary time elapse, discomfort and the fatalities during the travelling and in turn improvise the convenience in the transportation providing a continuous traffic movement. But certain emergent situations such as the natural disasters, accidents, damaged roads, sudden break down of the vehicles and the appearance of the emergency vehicles disturb the regular traffic flow and safety of the on road vehicles. To ensure the safety of on road vehicles and elude the collision of the vehicles that take place due to improper communications or communication attacks, the paper puts forth an effective routing protocol with collision avoidance, (ERPCA) to identify vehicles with the reliability to transfer information on time and evade the discomforts in travelling. The evaluation of the ERPCA with the network simulator-2 evinces the improvement in the performance of the vehicular-adhoc networks


Author(s):  
Smys s ◽  
Jennifer S. Raj

Adhoc networks as the name suggests is framed for a specialized reason using the volunteering devices available near the source to destination, utilizing the devices in between the source and the destination as the relaying nodes. Several methods were framed to optimize the performance of the wireless adhoc network to retain the energy level of the devices in turn to extend the lifetime of the devices. The cluster based routing seemed to be very promising in terms of energy efficiency, throughput and delay. These cluster based adhoc networks are very much exposed to security breaches as they are not aided with sufficient security. The conveyance taking place between the head of the cluster to base station is often affected by the many attacks from different sources by altering the information or hacking the information. So the paper puts forward the verification code for every data transmitted from the head of the cluster to the base station. The proposed method is validated using the network simulator-2 in the terms of throughput, energy consumption and security in data conveyance and compared with the prevailing methods that bare authentication.


2019 ◽  
Vol 17 (9) ◽  
pp. 696-700
Author(s):  
D. Muruganandam ◽  
J. Martin Leo Manickam

A MANET is an infrastructure-less type network, which consists of number of mobile nodes connected through wireless network interfaces. The Communication among nodes is made successfully when the nodes dynamically set up route among one another. The open nature and infrastructureless type of such networks causes the attacker's interest to penetrate through the network and decrease the network performance. Thus Security becomes a major concern for protected communication between mobile nodes. Packet misrouting stops the packet from reaching the destination by a malicious intermediate node. But the malicious node makes the intuition to its neighbors that it has done the genuine packet forwarding action. Moreover the malicious node makes the neighbours to suspect the normal node as malicious one. The proposed work ensures the detection of malicious nodes and avoids suspecting the trustworthy.


Sign in / Sign up

Export Citation Format

Share Document