Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (45)
  • Open Access

    ARTICLE

    Geographic Drone-based Route Optimization Approach for Emergency Area Ad-Hoc Network

    V. Krishnakumar*, R. Asokan

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 985-1000, 2023, DOI:10.32604/csse.2023.029189 - 16 August 2022

    Abstract Wireless sensor Mobile ad hoc networks have excellent potential in moving and monitoring disaster area networks on real-time basis. The recent challenges faced in Mobile Ad Hoc Networks (MANETs) include scalability, localization, heterogeneous network, self-organization, and self-sufficient operation. In this background, the current study focuses on specially-designed communication link establishment for high connection stability of wireless mobile sensor networks, especially in disaster area network. Existing protocols focus on location-dependent communications and use networks based on typically-used Internet Protocol (IP) architecture. However, IP-based communications have a few limitations such as inefficient bandwidth utilization, high processing, less… More >

  • Open Access

    ARTICLE

    Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET

    S. Neelavathy Pari1,*, K. Sudharson2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2775-2789, 2023, DOI:10.32604/csse.2023.029345 - 01 August 2022

    Abstract A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network (MANET). A MANET’s nodes could engage actively and dynamically with one another. However, MANETs, from the other side, are exposed to severe potential threats that are difficult to counter with present security methods. As a result, several safe communication protocols designed to enhance the secure interaction among MANET nodes. In this research, we offer a reputed optimal routing value among network nodes, secure computations, and misbehavior detection predicated on node’s trust levels with a Hybrid Trust based Reputation… More >

  • Open Access

    ARTICLE

    Improvisation of Node Mobility Using Cluster Routing-based Group Adaptive in MANET

    J. Shanthini1, P. Punitha2,*, S. Karthik2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2619-2636, 2023, DOI:10.32604/csse.2023.027330 - 01 August 2022

    Abstract In today's Internet routing infrastructure, designers have addressed scaling concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary constrain. In tactical Mobile Ad-hoc Network (MANET), hubs can function based on the work plan in various social affairs and the internally connected hubs are almost having the related moving standards where the topology between one and the other are tightly coupled in steady support by considering the touchstone of hubs such as a self-sorted out, self-mending and self-administration. Clustering in the routing process is one of the key aspects to… More >

  • Open Access

    ARTICLE

    Swarm Intelligence Based Routing with Black Hole Attack Detection in MANET

    S. A. Arunmozhi*, S. Rajeswari, Y. Venkataramani

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2337-2347, 2023, DOI:10.32604/csse.2023.024340 - 01 August 2022

    Abstract Mobile Ad hoc Network (MANET) possesses unique characteristics which makes it vulnerable to security threats. In MANET, it is highly challenging to protect the nodes from cyberattacks. Power conservation improves both life time of nodes as well as the network. Computational capabilities and memory constraints are critical issues in the implementation of cryptographic techniques. Energy and security are two important factors that need to be considered for improving the performance of MANET. So, the incorporation of an energy efficient secure routing protocol becomes inevitable to ensure appropriate action upon the network. The nodes present in More >

  • Open Access

    ARTICLE

    A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network

    W. Gracy Theresa1,*, A. Gayathri2, P. Rama3

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1337-1351, 2023, DOI:10.32604/iasc.2023.028425 - 19 July 2022

    Abstract Mobile computing is the most powerful application for network communication and connectivity, given recent breakthroughs in the field of wireless networks or Mobile Ad-hoc networks (MANETs). There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision. For most applications, a framework must ensure that the retrieved data reflects the transmitted data. Before driving to other nodes, if the frame between the two nodes is deformed in the data-link layer, it must be repaired. Most link-layer protocols immediately disregard the frame… More >

  • Open Access

    ARTICLE

    WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services

    C. Edwin Singh1,*, S. Maria Celestin Vigila2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1737-1751, 2023, DOI:10.32604/iasc.2023.028022 - 19 July 2022

    Abstract Mobile ad-hoc networks (MANET) are garnering a lot of attention because of their potential to provide low-cost solutions to real-world communications. MANETs are more vulnerable to security threats. Changes in nodes, bandwidth limits, and centralized control and management are some of the characteristics. IDS (Intrusion Detection System) are the aid for detection, determination, and identification of illegal system activity such as use, copying, modification, and destruction of data. To address the identified issues, academics have begun to concentrate on building IDS-based machine learning algorithms. Deep learning is a type of machine learning that can produce… More >

  • Open Access

    ARTICLE

    An Optimal Cluster Head and Gateway Node Selection with Fault Tolerance

    P. Rahul*, B. Kaarthick

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1595-1609, 2023, DOI:10.32604/iasc.2023.025762 - 19 July 2022

    Abstract In Mobile Ad Hoc Networks (MANET), Quality of Service (QoS) is an important factor that must be analysed for the showing the better performance. The Node Quality-based Clustering Algorithm using Fuzzy-Fruit Fly Optimization for Cluster Head and Gateway Selection (NQCAFFFOCHGS) has the best network performance because it uses the Improved Weighted Clustering Algorithm (IWCA) to cluster the network and the FFO algorithm, which uses fuzzy-based network metrics to select the best CH and entryway. However, the major drawback of the fuzzy system was to appropriately select the membership functions. Also, the network metrics related to… More >

  • Open Access

    ARTICLE

    Fuzzy Fruit Fly Optimized Node Quality-Based Clustering Algorithm for Network Load Balancing

    P. Rahul1,*, N. Kanthimathi1, B. Kaarthick2, M. Leeban Moses1

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1583-1600, 2023, DOI:10.32604/csse.2023.027424 - 15 June 2022

    Abstract Recently, the fundamental problem with Hybrid Mobile Ad-hoc Networks (H-MANETs) is to find a suitable and secure way of balancing the load through Internet gateways. Moreover, the selection of the gateway and overload of the network results in packet loss and Delay (DL). For optimal performance, it is important to load balance between different gateways. As a result, a stable load balancing procedure is implemented, which selects gateways based on Fuzzy Logic (FL) and increases the efficiency of the network. In this case, since gateways are selected based on the number of nodes, the Energy More >

  • Open Access

    ARTICLE

    An Improved Multi-Objective Particle Swarm Optimization Routing on MANET

    G. Rajeshkumar1,*, M. Vinoth Kumar2, K. Sailaja Kumar3, Surbhi Bhatia4, Arwa Mashat5, Pankaj Dadheech6

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1187-1200, 2023, DOI:10.32604/csse.2023.026137 - 15 June 2022

    Abstract A Mobile Ad hoc Network (MANET) is a group of low-power consumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized organization. The primary aim of MANETs is to extend flexibility into the self-directed, mobile, and wireless domain, in which a cluster of autonomous nodes forms a MANET routing system. An Intrusion Detection System (IDS) is a tool that examines a network for malicious behavior/policy violations. A network monitoring system is often used to report/gather any suspicious attacks/violations. An IDS is a software program or hardware system that… More >

  • Open Access

    ARTICLE

    Timer Entrenched Baited Scheme to Locate and Remove Attacks in MANET

    S. Padmapriya1, R. Shankar2, R. Thiagarajan1,*, N. Partheeban3, A. Daniel3, S. Arun4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 491-505, 2023, DOI:10.32604/iasc.2023.027719 - 06 June 2022

    Abstract The Mobile Ad-hoc Network (MANET) is a dynamic topology that provides a variety of executions in various disciplines. The most sticky topic in organizational fields was MANET protection. MANET is helpless against various threats that affect its usability and accessibility. The dark opening assault is considered one of the most far-reaching dynamic assaults that deteriorate the organization's execution and reliability by dropping all approaching packages via the noxious node. The Dark Opening Node aims to deceive any node in the company that wishes to connect to another node by pretending to get the most delicate… More >

Displaying 21-30 on page 3 of 45. Per Page