A lightweight hierarchical authentication scheme for internet of things

A Akbarzadeh, M Bayat, B Zahednejad… - Journal of Ambient …, 2019 - Springer
Abstract The Internet of Things (IoT) technology enables numerous things with different
processing power and storage capacity to communicate and share data with each other …

[PDF][PDF] Analytical Model for Evaluating the Bottleneck Node in MANETs

AAK Mohammad, A Mirza… - Indian Journal of Science …, 2016 - researchgate.net
Objectives: Finding optimistic path between source to destination in Mobile ad hoc networks
is most challenging task due to its constrained resources. Constrained battery power is one …

Α Chaotic Map-based Approach to Reduce Black Hole Attacks and Authentication Computational Time in MANETs

ASQ Syed, C Atheeq, L Ali, MT Quasim - Engineering, Technology & …, 2024 - etasr.com
Abstract The need for Mobile Ad hoc Networks (MANETs) has expanded with the
development of mobile computing and wireless sensor network technologies. However, this …

[PDF][PDF] Advancing secure mobile cloud computing: A Chaotic Maps-based password key agreement protocol

SS Hashmi, MA Arif, AAK Mohammad… - … des Systemes d' …, 2023 - researchgate.net
The exponential growth in mobile technology has precipitated a substantial increase in
global IP traffic, predominantly fueled by mobile devices. Mobile Cloud Computing (MCC) …

Providing security towards the MANETs based on chaotic maps and its performance

AAK Mohammad, AM Mahmood, S Vemuru - … : Proceedings of the Fourth …, 2018 - Springer
Mobile ad hoc network (MANET) consists of mobile nodes that communicate with one
another through radio communication channel. This wireless channel is vulnerable to …

[PDF][PDF] The mutual authentication scheme to detect virtual side channel attack in cloud computing

A Verma, M Mittal, B Chhabra - International Journal of Computer …, 2017 - academia.edu
Objectives: Cloud computing combines various resources and technologies and provides a
common platform for cost-effective business functions. It is an essential technology that is …

Mutual authenticated key agreement in Wireless Infrastructure-less network by Chaotic Maps based Diffie-Helman Property.

DNM Shyam, MA Hussain - Fusion: Practice & Applications, 2023 - search.ebscohost.com
Because wireless infrastructure-less networks are dynamic, varied, and scattered,
implementing security in them is exceedingly difficult. Authentication is the most crucial …

An Effective Mechanism to Mitigate Packet Drop** Attack from MANETs using Chaotic Map based Authentication Technique

CA Ahmed, M Mohammad… - Recent Patents on …, 2024 - ingentaconnect.com
Background: MANET is a self-organized wireless network with no infrastructure. Especially
data transfer from one system to another system needs to be done in a secure way. In order …

[PDF][PDF] Performance evaluation of reactive routing protocol using simulation knowledge

AAK Mohammad, MA Bari, S Ahamad… - Materials Today …, 2021 - academia.edu
abstract Mobile ad-hoc network technology is developed to establish the internet
connectivity regardless of geographical location all the time. It is an infrastructure less …

Cluster Based Energy-Efficient Routing Protocol for VANET to Improve the Network Performance

PV Reddy, AAK Mohammad, AM Abdul - Mathematical Statistician and …, 2022 - philstat.org
Abstract Vehicular Ad Hoc Networks (VANETs) is a special case of mobile ad hoc networks,
which allows its users with high mobility. The network used to spread the informationamong …