[HTML][HTML] A survey on the implementation and management of secure virtual private networks (vpns) and virtual lans (vlans) in static and mobile scenarios

AF Gentile, P Fazio, G Miceli - Telecom, 2021‏ - mdpi.com
Nowadays, the demand for connection between the remote offices of a company, or
between research locations, and constantly increasing work mobility (partly due to the …

Routing in mobile opportunistic social networks with selfish nodes

A Socievole, A Caputo, F De Rango… - … and Mobile Computing, 2019‏ - Wiley Online Library
When the connection to Internet is not available during networking activities, an
opportunistic approach exploits the encounters between mobile human‐carried devices for …

Energy efficient QoS aware hierarchical KF-MAC routing protocol in MANET

M Rao, N Singh - Wireless Personal Communications, 2018‏ - Springer
The paper proposes an energy efficient quality of services (QoS) aware hierarchical KF-
MAC routing protocol in mobile ad-hoc networks. The proposed KF-MAC (K-means cluster …

Light weight cryptography for cloud-based e-health records

S Mittal, C Monga, K Upreti, N Kumar… - 2022 7th …, 2022‏ - ieeexplore.ieee.org
Cloud computing is currently a popular research topic among academics. It is an internet-
based resource pool with a wide range of resources. The cloud environment is extremely …

Optimizing power consumption of mobile devices for video streaming over 4G LTE networks

J Zhang, ZJ Wang, Z Quan, J Yin, Y Chen… - Peer-to-Peer Networking …, 2018‏ - Springer
While the video streaming technique and 4G LTE networks are develo** rapidly, the
advancement of the battery technology, however, is relatively slow. Existing works have paid …

An integrated incentive and trust-based optimal path identification in ad hoc on-demand multipath distance vector routing for MANET

AO Alkhamisi, SM Buhari… - … Journal of Grid and …, 2020‏ - inderscienceonline.com
A Mobile Ad hoc Network (MANET) can work well only when the mobile nodes behave
cooperatively in packet routing. To reduce the hazards from malicious nodes and enhance …

Power consumption analysis of video streaming in 4G LTE networks

J Zhang, ZJ Wang, S Guo, D Yang, G Fang, C Peng… - Wireless …, 2018‏ - Springer
Video streaming, one of the most popular technologies for online video playback, has
already been applied to 4G LTE networks. Previous work has been devoted to …

A distributed mitigation strategy against DoS attacks in edge computing

G Potrino, F De Rango, P Fazio - 2019 Wireless …, 2019‏ - ieeexplore.ieee.org
Internet of Things (IoT) is a platform where every day devices become smarter, every day
processing becomes intelligent, and every day communication becomes informative …

Enhanced secure and efficient key management algorithm and fuzzy with trust management for MANETs

NA Malik, M Rai - Proceedings of the International Conference on …, 2020‏ - papers.ssrn.com
Abstract Mobile Ad-hoc Network (MANET), a network of self-configuring that ignores
consuming static network infrastructure besides the centralized Base Station (BS). The …

Hybrid MANET–DTN and a new algorithm for relay nodes selection

J Papaj, L Dobos, A Cizmar - Wireless Personal Communications, 2017‏ - Springer
In this paper, a new way to a selection of the secure relay nodes in hybrid MANET–DTN
networks based on the cooperation between routing, trust and game theory mechanisms is …