Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    Geographic Drone-based Route Optimization Approach for Emergency Area Ad-Hoc Network

    V. Krishnakumar*, R. Asokan

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 985-1000, 2023, DOI:10.32604/csse.2023.029189

    Abstract Wireless sensor Mobile ad hoc networks have excellent potential in moving and monitoring disaster area networks on real-time basis. The recent challenges faced in Mobile Ad Hoc Networks (MANETs) include scalability, localization, heterogeneous network, self-organization, and self-sufficient operation. In this background, the current study focuses on specially-designed communication link establishment for high connection stability of wireless mobile sensor networks, especially in disaster area network. Existing protocols focus on location-dependent communications and use networks based on typically-used Internet Protocol (IP) architecture. However, IP-based communications have a few limitations such as inefficient bandwidth utilization, high processing, less transfer speeds, and excessive memory… More >

  • Open Access

    ARTICLE

    Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET

    S. Neelavathy Pari1,*, K. Sudharson2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2775-2789, 2023, DOI:10.32604/csse.2023.029345

    Abstract A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network (MANET). A MANET’s nodes could engage actively and dynamically with one another. However, MANETs, from the other side, are exposed to severe potential threats that are difficult to counter with present security methods. As a result, several safe communication protocols designed to enhance the secure interaction among MANET nodes. In this research, we offer a reputed optimal routing value among network nodes, secure computations, and misbehavior detection predicated on node’s trust levels with a Hybrid Trust based Reputation Mechanism (HTRM). In addition,… More >

  • Open Access

    ARTICLE

    Improvisation of Node Mobility Using Cluster Routing-based Group Adaptive in MANET

    J. Shanthini1, P. Punitha2,*, S. Karthik2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2619-2636, 2023, DOI:10.32604/csse.2023.027330

    Abstract In today's Internet routing infrastructure, designers have addressed scaling concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary constrain. In tactical Mobile Ad-hoc Network (MANET), hubs can function based on the work plan in various social affairs and the internally connected hubs are almost having the related moving standards where the topology between one and the other are tightly coupled in steady support by considering the touchstone of hubs such as a self-sorted out, self-mending and self-administration. Clustering in the routing process is one of the key aspects to increase MANET performance by coordinating… More >

  • Open Access

    ARTICLE

    An Enhanced Trust-Based Secure Route Protocol for Malicious Node Detection

    S. Neelavathy Pari1,*, K. Sudharson2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2541-2554, 2023, DOI:10.32604/iasc.2023.030284

    Abstract The protection of ad-hoc networks is becoming a severe concern because of the absence of a central authority. The intensity of the harm largely depends on the attacker’s intentions during hostile assaults. As a result, the loss of Information, power, or capacity may occur. The authors propose an Enhanced Trust-Based Secure Route Protocol (ETBSRP) using features extraction. First, the primary and secondary trust characteristics are retrieved and achieved routing using a calculation. The complete trust characteristic obtains by integrating all logical and physical trust from every node. To assure intermediate node trustworthiness, we designed an ETBSRP, and it calculates and… More >

  • Open Access

    ARTICLE

    A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network

    W. Gracy Theresa1,*, A. Gayathri2, P. Rama3

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1337-1351, 2023, DOI:10.32604/iasc.2023.028425

    Abstract Mobile computing is the most powerful application for network communication and connectivity, given recent breakthroughs in the field of wireless networks or Mobile Ad-hoc networks (MANETs). There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision. For most applications, a framework must ensure that the retrieved data reflects the transmitted data. Before driving to other nodes, if the frame between the two nodes is deformed in the data-link layer, it must be repaired. Most link-layer protocols immediately disregard the frame and enable the high-layer protocols… More >

  • Open Access

    ARTICLE

    WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services

    C. Edwin Singh1,*, S. Maria Celestin Vigila2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1737-1751, 2023, DOI:10.32604/iasc.2023.028022

    Abstract Mobile ad-hoc networks (MANET) are garnering a lot of attention because of their potential to provide low-cost solutions to real-world communications. MANETs are more vulnerable to security threats. Changes in nodes, bandwidth limits, and centralized control and management are some of the characteristics. IDS (Intrusion Detection System) are the aid for detection, determination, and identification of illegal system activity such as use, copying, modification, and destruction of data. To address the identified issues, academics have begun to concentrate on building IDS-based machine learning algorithms. Deep learning is a type of machine learning that can produce exceptional outcomes. This study proposes… More >

  • Open Access

    ARTICLE

    Support-Vector-Machine-based Adaptive Scheduling in Mode 4 Communication

    Muhammad Adnan Khan1,2, Ahmed Abu-Khadrah3, Shahan Yamin Siddiqui4, Taher M. Ghazal5,6, Tauqeer Faiz6, Munir Ahmad7, Sang-Woong Lee2,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3319-3331, 2022, DOI:10.32604/cmc.2022.023392

    Abstract Vehicular ad-hoc networks (VANETs) are mobile networks that use and transfer data with vehicles as the network nodes. Thus, VANETs are essentially mobile ad-hoc networks (MANETs). They allow all the nodes to communicate and connect with one another. One of the main requirements in a VANET is to provide self-decision capability to the vehicles. Cognitive memory, which stores all the previous routes, is used by the vehicles to choose the optimal route. In networks, communication is crucial. In cellular-based vehicle-to-everything (CV2X) communication, vital information is shared using the cooperative awareness message (CAM) that is broadcast by each vehicle. Resources are… More >

  • Open Access

    ARTICLE

    Fuzzy Fruit Fly Optimized Node Quality-Based Clustering Algorithm for Network Load Balancing

    P. Rahul1,*, N. Kanthimathi1, B. Kaarthick2, M. Leeban Moses1

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1583-1600, 2023, DOI:10.32604/csse.2023.027424

    Abstract Recently, the fundamental problem with Hybrid Mobile Ad-hoc Networks (H-MANETs) is to find a suitable and secure way of balancing the load through Internet gateways. Moreover, the selection of the gateway and overload of the network results in packet loss and Delay (DL). For optimal performance, it is important to load balance between different gateways. As a result, a stable load balancing procedure is implemented, which selects gateways based on Fuzzy Logic (FL) and increases the efficiency of the network. In this case, since gateways are selected based on the number of nodes, the Energy Consumption (EC) was high. This… More >

  • Open Access

    ARTICLE

    Modelling a Learning-Based Dynamic Tree Routing Model for Wireless Mesh Access Networks

    N. Krishnammal1,*, C. Kalaiarasan2, A. Bharathi3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1531-1549, 2023, DOI:10.32604/csse.2023.024251

    Abstract Link asymmetry in wireless mesh access networks (WMAN) of Mobile ad-hoc Networks (MANETs) is due mesh routers’ transmission range. It is depicted as significant research challenges that pose during the design of network protocol in wireless networks. Based on the extensive review, it is noted that the substantial link percentage is symmetric, i.e., many links are unidirectional. It is identified that the synchronous acknowledgement reliability is higher than the asynchronous message. Therefore, the process of establishing bidirectional link quality through asynchronous beacons underrates the link reliability of asymmetric links. It paves the way to exploit an investigation on asymmetric links… More >

  • Open Access

    ARTICLE

    Timer Entrenched Baited Scheme to Locate and Remove Attacks in MANET

    S. Padmapriya1, R. Shankar2, R. Thiagarajan1,*, N. Partheeban3, A. Daniel3, S. Arun4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 491-505, 2023, DOI:10.32604/iasc.2023.027719

    Abstract The Mobile Ad-hoc Network (MANET) is a dynamic topology that provides a variety of executions in various disciplines. The most sticky topic in organizational fields was MANET protection. MANET is helpless against various threats that affect its usability and accessibility. The dark opening assault is considered one of the most far-reaching dynamic assaults that deteriorate the organization's execution and reliability by dropping all approaching packages via the noxious node. The Dark Opening Node aims to deceive any node in the company that wishes to connect to another node by pretending to get the most delicate ability to support the target… More >

Displaying 11-20 on page 2 of 31. Per Page