Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Opportunistic Routing with Multi-Channel Cooperative Neighbour Discovery

    S. Sathish Kumar1,*, G. Ravi2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2367-2382, 2023, DOI:10.32604/iasc.2023.030054

    Abstract Due to the scattered nature of the network, data transmission in a distributed Mobile Ad-hoc Network (MANET) consumes more energy resources (ER) than in a centralized network, resulting in a shorter network lifespan (NL). As a result, we build an Enhanced Opportunistic Routing (EORP) protocol architecture in order to address the issues raised before. This proposed routing protocol goal is to manage the routing cost by employing power, load, and delay to manage the routing energy consumption based on the flooding of control packets from the target node. According to the goal of the proposed protocol technique, it is possible… More >

  • Open Access

    ARTICLE

    Secure Localization Based Authentication (SLA) Strategy for Data Integrity in WNS

    V. Manikandan1,*, M. Sivaram1, Amin Salih Mohammed2, V. Porkodi3, K. Shankar4

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4005-4018, 2021, DOI:10.32604/cmc.2021.014643

    Abstract Wireless Sensor Networks (WSN) has been extensively utilized as a communication model in Internet of Things (IoT). As well, to offer service, numerous IoT based applications need effective transmission over unstable locations. To ensure reliability, prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs. Moreover, these models are affected by crucial denial of service (DoS) attacks, where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs. Here, secure localization based authentication (SLA) is presented to fight against DoS attack, and to fulfil the need of reliability and authentication. By… More >

Displaying 1-10 on page 1 of 2. Per Page