Security challenges in mobile ad hoc networks: A survey

A Dorri, SR Kamel, E Kheirkhah - arxiv preprint arxiv:1503.03233, 2015 - arxiv.org
MANET is a kind of Ad hoc network with mobile, wireless nodes. Because of its special
characteristics like dynamic topology, hop-by-hop communications and easy and quick …

An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET

A Dorri - Wireless Networks, 2017 - Springer
Abstract Mobile Ad hoc Network (MANET) is a self-configurable, self-maintenance network
with wireless, mobile nodes. Special features of MANET like dynamic topology, hop-by-hop …

A provable and secure key exchange protocol based on the elliptical curve diffe–hellman for wsn

U Iqbal, S Shafi - Advances in Big Data and Cloud Computing …, 2019 - Springer
Key Exchange serves as bedrock of all cryptographic primitives. As WSN are resource
constraint by virtue of limited resources, traditional cryptographic protocols are not optimal …

ES-AKA: An efficient and secure authentication and key agreement protocol for UMTS networks

N Saxena, J Thomas, NS Chaudhari - Wireless Personal Communications, 2015 - Springer
The authentication and key agreement (AKA) protocol of the Universal Mobile
Telecommunication System (UMTS) was proposed to solve the vulnerabilities found in the …

Hybrid cryptography algorithm for secure data communication in WSNs: DECRSA

A Kardi, R Zagrouba - Congress on Intelligent Systems: Proceedings of …, 2021 - Springer
In this paper, we propose a dynamic hybrid cryptosystem based on the two famous
cryptographic schemes RSA and ECC dedicated to Wireless Sensor Networks (WSNs). Our …

Security in wireless sensor networks using ECC

N Saqib, U Iqbal - 2016 IEEE International Conference on …, 2016 - ieeexplore.ieee.org
Wireless Sensor Networks have been an active area of research owing to its myriad range of
applications. Traditional security protocols are not feasible for such networks due to their …

Panoramic view of cloud storage security attacks: an insight and security approaches

E Daniel, S Durga, S Seetha - 2019 3rd international …, 2019 - ieeexplore.ieee.org
Recent years the computer technologies are reaching every corner in the world through the
cloud computing services. Cloud storage has many advantages and it allows the user to …

Implementation of ECC with hidden Generator point in Wireless Sensor Networks

RK Kodali - 2014 sixth international conference on …, 2014 - ieeexplore.ieee.org
With ever growing demand for Wireless Sensor Networks (WSNs) in military and commercial
application areas, the urge for secure data exchange over the network is also on the …

[PDF][PDF] NS-AKA: An improved and efficient AKA protocol for 3G (UMTS) networks

N Saxena, NS Chaudhari - … on advances in computer science and …, 2014 - academia.edu
In this paper, we propose an improved and efficient AKA protocol named “NS-AKA” to
prevent the 3G UMTS networks from various attacks like man-in-the-middle attack …

Key exchange protocol for WSN resilient against man in the middle attack

N Saqib - 2016 IEEE International Conference on Advances in …, 2016 - ieeexplore.ieee.org
Wireless Sensor Networks has evoked a lot of attention in recent years as it offers a broad
horizon of applications in environmental monitoring. Security of such networks is a key area …