A lightweight hierarchical authentication scheme for internet of things
Abstract The Internet of Things (IoT) technology enables numerous things with different
processing power and storage capacity to communicate and share data with each other …
processing power and storage capacity to communicate and share data with each other …
[PDF][PDF] Analytical Model for Evaluating the Bottleneck Node in MANETs
Objectives: Finding optimistic path between source to destination in Mobile ad hoc networks
is most challenging task due to its constrained resources. Constrained battery power is one …
is most challenging task due to its constrained resources. Constrained battery power is one …
Α Chaotic Map-based Approach to Reduce Black Hole Attacks and Authentication Computational Time in MANETs
Abstract The need for Mobile Ad hoc Networks (MANETs) has expanded with the
development of mobile computing and wireless sensor network technologies. However, this …
development of mobile computing and wireless sensor network technologies. However, this …
[PDF][PDF] Advancing secure mobile cloud computing: A Chaotic Maps-based password key agreement protocol
The exponential growth in mobile technology has precipitated a substantial increase in
global IP traffic, predominantly fueled by mobile devices. Mobile Cloud Computing (MCC) …
global IP traffic, predominantly fueled by mobile devices. Mobile Cloud Computing (MCC) …
Providing security towards the MANETs based on chaotic maps and its performance
Mobile ad hoc network (MANET) consists of mobile nodes that communicate with one
another through radio communication channel. This wireless channel is vulnerable to …
another through radio communication channel. This wireless channel is vulnerable to …
[PDF][PDF] The mutual authentication scheme to detect virtual side channel attack in cloud computing
A Verma, M Mittal, B Chhabra - International Journal of Computer …, 2017 - academia.edu
Objectives: Cloud computing combines various resources and technologies and provides a
common platform for cost-effective business functions. It is an essential technology that is …
common platform for cost-effective business functions. It is an essential technology that is …
Mutual authenticated key agreement in Wireless Infrastructure-less network by Chaotic Maps based Diffie-Helman Property.
Because wireless infrastructure-less networks are dynamic, varied, and scattered,
implementing security in them is exceedingly difficult. Authentication is the most crucial …
implementing security in them is exceedingly difficult. Authentication is the most crucial …
An Effective Mechanism to Mitigate Packet Drop** Attack from MANETs using Chaotic Map based Authentication Technique
CA Ahmed, M Mohammad… - Recent Patents on …, 2024 - ingentaconnect.com
Background: MANET is a self-organized wireless network with no infrastructure. Especially
data transfer from one system to another system needs to be done in a secure way. In order …
data transfer from one system to another system needs to be done in a secure way. In order …
[PDF][PDF] Performance evaluation of reactive routing protocol using simulation knowledge
abstract Mobile ad-hoc network technology is developed to establish the internet
connectivity regardless of geographical location all the time. It is an infrastructure less …
connectivity regardless of geographical location all the time. It is an infrastructure less …
Cluster Based Energy-Efficient Routing Protocol for VANET to Improve the Network Performance
Abstract Vehicular Ad Hoc Networks (VANETs) is a special case of mobile ad hoc networks,
which allows its users with high mobility. The network used to spread the informationamong …
which allows its users with high mobility. The network used to spread the informationamong …