Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-8 of 8 total results
A Secure Data Dissemination in a DHT-Based Routing ...
Over the past decade, distributed hash table- (DHT-) based routing protocols have been adopted in wireless ad hoc networks (WANETs) to achieve scalability in the route discovery phase by avoiding the flooding mechanism. The security aspects of the routing protocols based on the DHT mechanism are crucial to address and have not been discussed in the existing literature....
An adaptive fuzzy logic based secure routing protocol in ...
An adaptive fuzzy logic based secure routing protocol in mobile ad hoc networks ... mobile ad hoc network are: • Dynamic topology. Since nodes in the network can move arbitrarily, the topology of the network also changes. ... authentication and encryption algorithm. The Security-Level of mobile hosts is not fully considered....
 A Novel Approach of Secure Routing Protocol for Mobile Ad ...
Secure Routing Protocol for Mobile Ad Hoc Network by Imran Hossain Faruk, bearing roll number 211CS2069, is a record of an original research work carried out by him under my supervision and guidance in partial ful lment of the requirements for the award of the degree of Master of Technology in Computer Science and Engineering....
 A SECURE ZONE-BASED ROUTING PROTOCOL FOR MOBILE AD HOC ...
National Institute Of Technology Rourkela CERTIFICATE This is to certify that the thesis entitled, “A Secure Zone-Based Routing Protocol for Mobile Ad Hoc Networks” submitted by Mr. Niroj Kumar Pani in partial fulfillment of the requirements for the award of Master of Technology Degree in Computer Science and Engineering with specialization in “Information Security” at National ......
 SHSDAP: Secure Hierarchical Service Discovery and ...
SHSDAP: Secure Hierarchical Service Discovery and Advertisement Protocol in Cluster Based Mobile Ad hoc Network Seyed Amin Hosseini Seno, Rahmat Budiarto and Tat-Chee Wan School of Computer Sciences, Universiti Sains Malaysia, 11800 Penang, Malaysia Abstract: Mobile Ad hoc Networks (MANETs) have many potential applications in various fields such as...
profdoc.um.ac.ir/articles/a/1024855.pdf
Average Rating (0 votes)
 Secure Routing for Mobile Ad hoc Networks
Secure Routing for Mobile Ad hoc Networks Panagiotis Papadimitratos and Zygmunt J. Haas ... proposed here Secure Routing Protocol (SRP) to be applied as an extension of a multitude of existing routing protocols. In particular, the Dynamic Source Routing (DSR) [8] and the IERP [13] of the Zone Routing Protocol (ZRP) [14]...
An Efficient Secure Ad Hoc Routing Protocol for Optimize ...
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET h…
Secure Data Transfer in Manet with Key Calculator and Key ...
SNIP measures a source’s contextual citation impact by weighting citations based on the total number of citations in a subject field. It helps you make a direct comparison of sources in different subject fields. SNIP takes into account characteristics of the source's subject field, which is the set of documents citing that source.