Key management for beyond 5G mobile small cells: A survey

M De Ree, G Mantas, A Radwan, S Mumtaz… - IEEE …, 2019 - ieeexplore.ieee.org
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …

RETRACTED ARTICLE: A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network

T Manjula, B Anand - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
As related to environments which possess non-malicious nodes contained in a network, the
well-known protocols that are provides by the existing researchers for routing are designed …

A protocol for end-to-end key establishment during route discovery in MANETs

SH Talawar, RC Hansdah - 2015 IEEE 29th international …, 2015 - ieeexplore.ieee.org
An end-to-end shared secret key between two distant nodes in a mobile ad hoc network
(MANET) is essential for providing secure communication between them. However, to …

A Distributed and Decentralized Certificateless Framework for Reliable Shared Data Auditing for FOG-CPS Networks

MS Burra, S Maity - IEEE Access, 2023 - ieeexplore.ieee.org
FOG computing enhances communication efficiency by processing data at the network's
edge. In many critical infrastructure (CI) networks, user entities outsource data to the FOG …

Identity Based Encryption and Broadcast using Hybrid Cryptographic Techniques

K Singh, MS Burra, S Maity - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
The quick advancement of cloud computing has brought in an increment in the number of
businesses and people who are using the public cloud to store and exchange data. In order …

Adapting software development process towards the model driven architecture

V Nikulsins, O Nikiforova - 2008 The Third International …, 2008 - ieeexplore.ieee.org
Model driven architecture (MDA) is increasingly gaining the attention of both research
communities and industry. MDA is a model-oriented software development paradigm, which …

Survey on Key Generation for Sharing of Identity Based Encrypted Data

S Paigwar, J Alam, S Maity - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Encryption is a way to keep important information safe when it is being shared between
different people. Sometimes, we want to share this encrypted information with more people …

适用于集群无人机的自组网安全分簇算法

崔朝阳, 孙甲琦, 徐松艳, 蒋鑫 - 山东大学学报 (理学版), 2018 - lxbwk.njournal.sdu.edu.cn
集群无人机自组网的节点数量多, 移动速度快ꎬ 适合采用分簇的网络拓扑结构ꎬ
而安全的分簇算法是簇结构自组网安全性的重要基础ꎮ 分析了集群无人机自组网的特点和其对 …

[BOOK][B] Decentralized key management for Beyond 5G network coding-enabled mobile small cells

MJM de Ree - 2021 - search.proquest.com
This thesis investigates decentralized key management and presents two novel
decentralized key management schemes that are capable of providing secure …

[PDF][PDF] A Review on Secure Routing Protocols in MANET

K Khedkar, S Joshi - system, 2014 - academia.edu
Mobile Ad hoc network (MANET) is a collection of self configuring, multi-hop wireless
network. Due to the mobility and dynamic nature of MANET, network is not secure. MANET is …