Author of the publication

Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks.

, , , and . GLOBECOM Workshops, page 1037-1041. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning-Based Multiplexing of Grant-Based and Grant-Free Heterogeneous Services with Short Packets., , , and . GLOBECOM, page 1-6. IEEE, (2021)Reinforcement Learning Based Congestion Control Mechanism for Opportunistic Networks., , , , and . GLOBECOM (Workshops), page 67-73. IEEE, (2022)Fuzzy Geocasting in Opportunistic Networks., , , , , and . BWCCA, volume 97 of Lecture Notes in Networks and Systems, page 279-292. Springer, (2019)Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks., , , and . FPS, volume 7743 of Lecture Notes in Computer Science, page 308-323. Springer, (2012)Security threats in M2M networks: a survey with case study., , , , and . Comput. Syst. Sci. Eng., (2017)An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based Multipath., , and . GPC, volume 7861 of Lecture Notes in Computer Science, page 517-525. Springer, (2013)A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks., , , and . CITS, page 1-5. IEEE, (2013)MR-Chord: A scheme for enhancing Chord lookup accuracy and performance in mobile P2P network., , , and . ICC, page 5408-5412. IEEE, (2012)Trust-enhanced message security protocol for mobile ad hoc networks., , , , and . ICC, page 988-992. IEEE, (2012)Proof of Retrieval and Ownership Protocols for Images through SPIHT Compression., , and . HPCC/CSS/ICESS, page 835-838. IEEE, (2014)