Malicious cluster head detection mechanism in wireless sensor networks

A Ismail, R Amin - Wireless Personal Communications, 2019 - Springer
In wireless ad hoc network, all nodes participate for the transmission of data within the
network and responsible for designing network topology. Suspicious and malicious activities …

Efficient pre-authentication scheme for inter-ASN handover in high mobility MANET

M Deva Priya, S Janakiraman, G Sandhya… - Wireless networks, 2021 - Springer
Abstract Ensuring Quality of Service (QoS) and providing seamless connectivity are
challenging in a mobile adhoc network. When Mobile Subscriber Station (MSS) moves …

Secure and pairing-free identity-based batch verification scheme in vehicle ad-hoc networks

X Hu, J Wang, H Xu, Y Liu, X Zhang - … 2016, Lanzhou, China, August 2-5 …, 2016 - Springer
Identity-based batch verification (IBBV) scheme is very desirable to solve efficiency, security
and privacy preservation issues for vehicular ad hoc network (VANET). In 2015, Tzeng et al …

[PDF][PDF] M. Deva Priya, Sengathir Janakiraman

G Sandhya, G Aishwaryalakshmi - researchgate.net
Abstract Ensuring Quality of Service (QoS) and providing seamless connectivity are
challenging in a mobile adhoc network. When Mobile Subscriber Station (MSS) moves …