Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Geographic Drone-based Route Optimization Approach for Emergency Area Ad-Hoc Network

    V. Krishnakumar*, R. Asokan

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 985-1000, 2023, DOI:10.32604/csse.2023.029189

    Abstract Wireless sensor Mobile ad hoc networks have excellent potential in moving and monitoring disaster area networks on real-time basis. The recent challenges faced in Mobile Ad Hoc Networks (MANETs) include scalability, localization, heterogeneous network, self-organization, and self-sufficient operation. In this background, the current study focuses on specially-designed communication link establishment for high connection stability of wireless mobile sensor networks, especially in disaster area network. Existing protocols focus on location-dependent communications and use networks based on typically-used Internet Protocol (IP) architecture. However, IP-based communications have a few limitations such as inefficient bandwidth utilization, high processing, less transfer speeds, and excessive memory… More >

  • Open Access

    ARTICLE

    Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

    K. Sudharson1,*, S. Arun2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1769-1784, 2022, DOI:10.32604/iasc.2022.026483

    Abstract Quantum Computing (QC). The content of node or sink nodes is processed using the fundamental principles of quantum mechanics. However, cryptography techniques face several other issues, such as availability, integrity, and vulnerability, to name a few. The researchers have overcome many obstacles, yet security remains a crucial concern in QC. However, experimenters recently discovered that the QC has a lot more data hacking than static networks. Moreover, the bitwise error is still present in implementing the Quantum Computing Cryptography Protocol (QCCP). Because all nodes are mobile and dynamic topology occurs, the proposed research uses the Quantum Elliptical Curve Cryptography (QECC)… More >

  • Open Access

    ARTICLE

    Resistance to Malicious Packet Droppers Through Enhanced AODV in a MANET

    Shirina Samreen*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4087-4106, 2022, DOI:10.32604/cmc.2022.026141

    Abstract Packet dropping in a mobile ad hoc network can manifest itself as the data plane attacks as well as control plane attacks. The former deal with malicious nodes performing packet drop on the data packets following the route formation and the latter deal with those malicious nodes which either drop or manipulate the control packets to degrade the network performance. The idea of the proposed approach is that during the route establishment, each of the on-path nodes is provided with pre-computed hash values which have to be used to provide a unique acknowledgement value to the upstream neighbor which acts… More >

  • Open Access

    ARTICLE

    Ant-based Energy Efficient Routing Algorithm for Mobile Ad hoc Networks

    P. E. Irin Dorathy1,*, M. Chandrasekaran2

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1423-1438, 2022, DOI:10.32604/iasc.2022.024815

    Abstract In this paper, an Ant Colony Optimization (ACO) based Energy Efficient Shortest Path Routing (AESR) algorithm is developed for Mobile Ad hoc Network (MANET). The Mobile Ad hoc Network consists of a group of mobile nodes that can communicate with each other without any predefined infrastructure. The routing process is critical for this type of network due to its dynamic topology, limited resources and wireless channel. The technique incorporated in this paper for optimizing the routing in a Mobile ad hoc network is Ant Colony Optimization. The ACO algorithm is used to solve network problems related to routing, security, etc.… More >

  • Open Access

    ARTICLE

    QoS in FANET Business and Swarm Data

    Jesús Hamilton Ortiz1, Carlos Andrés Tavera Romero2,*, Bazil Taha Ahmed3, Osamah Ibrahim Khalaf4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1877-1899, 2022, DOI:10.32604/cmc.2022.023796

    Abstract This article shows the quality of services in a wireless swarm of drones that form an ad hoc network between them Fly Ad Hoc Networks (FANET). Each drone has the ability to send and receive information (like a router); and can behave as a hierarchical node whit the intregration of three protocols: Multiprotocol Label Switch (MPLS), Fast Hierarchical AD Hoc Mobile (FHAM) and Internet Protocol version 6 (IPv6), in conclusion MPLS + FHAM + IPv6. The metrics analyzed in the FANET are: delay, jitter, throughput, lost and sent packets/received. Testing process was carried out with swarms composed of 10, 20,… More >

  • Open Access

    ARTICLE

    A Dynamic Resource-Aware Routing Protocol in Resource-Constrained Opportunistic Networks

    Aref Hassan Kurd Ali1,*, Halikul Lenando1, Slim Chaoui2,3, Mohamad Alrfaay1,4, Medhat A. Tawfeek5,6

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 4147-4167, 2022, DOI:10.32604/cmc.2022.020659

    Abstract Recently, Opportunistic Networks (OppNets) are considered to be one of the most attractive developments of Mobile Ad Hoc Networks that have arisen thanks to the development of intelligent devices. OppNets are characterized by a rough and dynamic topology as well as unpredictable contacts and contact times. Data is forwarded and stored in intermediate nodes until the next opportunity occurs. Therefore, achieving a high delivery ratio in OppNets is a challenging issue. It is imperative that any routing protocol use network resources, as far as they are available, in order to achieve higher network performance. In this article, we introduce the… More >

  • Open Access

    ARTICLE

    Adaptive Expanding Ring Search Based Per Hop Behavior Rendition of Routing in MANETs

    Durr-e-Nayab1,*, Mohammad Haseeb Zafar1,2, Mohammed Basheri2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1137-1152, 2021, DOI:10.32604/cmc.2021.014687

    Abstract Routing protocols in Mobile Ad Hoc Networks (MANETs) operate with Expanding Ring Search (ERS) mechanism to avoid flooding in the network while tracing step. ERS mechanism searches the network with discerning Time to Live (TTL) values described by respective routing protocol that save both energy and time. This work exploits the relation between the TTL value of a packet, traffic on a node and ERS mechanism for routing in MANETs and achieves an Adaptive ERS based Per Hop Behavior (AERSPHB) rendition of requests handling. Each search request is classified based on ERS attributes and then processed for routing while monitoring… More >

Displaying 1-10 on page 1 of 7. Per Page