Articles with "secure routing" as a keyword



Photo by scottwebb from unsplash

Establishing Secure Routing Path Using Trust to Enhance Security in MANET

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Personal Communications"

DOI: 10.1007/s11277-019-06724-0

Abstract: Because of versatility and portability brought by remote system made it conceivable in numerous applications. Among all the contemporary remote systems, mobile ad hoc network (MANET) has turned out to be one vital subject because… read more here.

Keywords: manet; security manet; secure routing; hub ... See more keywords
Photo by mbrunacr from unsplash

On energy efficient secure routing in multi-hop underlay D2D communications for IoT applications

Sign Up to like & get
recommendations!
Published in 2020 at "Ad Hoc Networks"

DOI: 10.1016/j.adhoc.2020.102275

Abstract: Abstract In this paper, a physical layer security based secure routing problem in a multi-hop cognitive radio enabled device-to-device (CRD2D) communication, under the threat of multiple randomly distributed eavesdroppers (EVEs), is studied. Delivery of confidential… read more here.

Keywords: multi hop; energy; secure routing; iot applications ... See more keywords
Photo by hudsoncrafted from unsplash

Improved Blowfish Algorithm-Based Secure Routing Technique in IoT-Based WSN

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3130005

Abstract: Internet of Things (IoT) has gained popularity with the growth and prospects of smart networks. It is intended to exploit the network edges, which enables smart service and assessment for IoT. Moreover, this exploitation not… read more here.

Keywords: based secure; blowfish algorithm; algorithm based; secure routing ... See more keywords
Photo by mbrunacr from unsplash

Energy-Aware and Trust-Based Secure Routing Protocol for Wireless Sensor Networks Using Adaptive Genetic Algorithm

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3144015

Abstract: Due to their working environments, limited resources and communication characteristics, wireless sensor networks face some challenges including energy optimization and security enhancement to extend the network lifetime and guarantee the network security. Therefore, an energy-aware… read more here.

Keywords: trust; energy; genetic algorithm; sensor networks ... See more keywords
Photo by dulhiier from unsplash

SCOTRES: Secure Routing for IoT and CPS

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2017.2752801

Abstract: Wireless ad-hoc networks are becoming popular due to the emergence of the Internet of Things and cyber-physical systems (CPSs). Due to the open wireless medium, secure routing functionality becomes important. However, the current solutions focus… read more here.

Keywords: routing iot; system; network; secure routing ... See more keywords
Photo by scottwebb from unsplash

An Adaptive QoS and Trust-Based Lightweight Secure Routing Algorithm for WSNs

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3189832

Abstract: The limited resources and low computational power of wireless sensor networks (WSNs) make them vulnerable to various security attacks. Conventional security mechanisms require too many resources to allow the reliable operation of WSNs due to… read more here.

Keywords: problem; trust; security; model ... See more keywords
Photo by hajjidirir from unsplash

Secure Routing in Multihop Ad-Hoc Networks With SRR-Based Reinforcement Learning

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2021.3128582

Abstract: In this letter, a reinforcement learning-assisted secure routing methodology is proposed for multihop ad-hoc networks in the presence of multiple eavesdroppers. Specifically, secure relay region (SRR) is firstly proposed, which depicts the distribution of the… read more here.

Keywords: reinforcement learning; methodology; multihop hoc; srr based ... See more keywords
Photo by hudsoncrafted from unsplash

SecRouting: Secure Routing for Network Functions Virtualization (NFV) Technology

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Circuits and Systems II: Express Briefs"

DOI: 10.1109/tcsii.2021.3119938

Abstract: The Network Functions Virtualization (NFV) technology is a network architecture that virtualizes traditional network services into virtualized network functions (VNFs) which are dependent on the reliability and security of standard hardware appliances (HAs). The mapping… read more here.

Keywords: functions virtualization; secure routing; virtualization nfv; network ... See more keywords