-
1Academic Journal
Authors: Ali Nikoutadbir, Sajjad Torabi, Sadegh Bolouki
Source: Journal of Network and Computer Applications. 243:104323
-
2Academic Journal
Source: IEEE Transactions on Aerospace and Electronic Systems. 59:8550-8564
Subject Terms: Computer Networks and Communications, Unmanned Aerial Vehicle Communications, Group Communication, Aerospace Engineering, FOS: Mechanical engineering, Encryption, Communications security, Redundancy (engineering), Engineering, Multicast, Computer security, FOS: Electrical engineering, electronic engineering, information engineering, Electrical and Electronic Engineering, Group key, Key (lock), Key generation, Computer network, Physical layer, Physical Layer Security in Wireless Communications, Secure Routing, Computer science, Transmission (telecommunications), Overhead (engineering), Operating system, Computer Science, Physical Sciences, Wireless, Telecommunications, Security in Wireless Sensor Networks
Linked Full Text -
3Academic Journal
Authors: Abdulmalık Shehu Yaro, Filip Malý, Karel Malý
Source: Emerging Science Journal, Vol 7, Iss 5, Pp 1762-1770 (2023)
Subject Terms: Artificial intelligence, Computer Networks and Communications, k-means, Fingerprint (computing), position error, rss, Pattern recognition (psychology), localization, Wireless Indoor Localization Techniques and Systems, Clustering Algorithms, Engineering, Cluster analysis, Context (archaeology), FOS: Electrical engineering, electronic engineering, information engineering, T1-995, WiFi Fingerprinting, Electrical and Electronic Engineering, Data mining, Biology, Technology (General), H1-99, Wireless Sensor Networks: Survey and Applications, Fuzzy clustering, Paleontology, Computer science, c-means, Social sciences (General), Algorithm, fingerprinting, Physical Sciences, Computer Science, Indoor Localization, Wireless, Telecommunications, Indoor Tracking, Security in Wireless Sensor Networks, Wireless Sensor Networks, clustering
-
4Academic Journal
Authors: Shalini Subramani, M. Selvi
Source: Soft Computing. 28:10345-10367
Subject Terms: Computer Networks and Communications, 02 engineering and technology, 7. Clean energy, Cluster analysis, Engineering, Quality of service, Computer security, Machine learning, 0202 electrical engineering, electronic engineering, information engineering, Ant colony optimization algorithms, Computer network, Routing (electronic design automation), Wireless Sensor Networks: Survey and Applications, Network packet, Intrusion detection system, Secure Routing, Routing Techniques, Computer science, Distributed computing, Intrusion Detection, Routing protocol, Energy consumption, Algorithm, Electrical engineering, Computer Science, Physical Sciences, Network Intrusion Detection and Defense Mechanisms, Security in Wireless Sensor Networks, Wireless Sensor Networks, Botnet Detection, Wireless sensor network
-
5Academic Journal
Authors: C. Sureshkumar, S. Sabena, L. SaiRamesh
Source: Signal, Image and Video Processing. 18:1317-1327
Linked Full TextSubject Terms: Ad Hoc Wireless Networks Research, Computer Networks and Communications, Link-state routing protocol, 02 engineering and technology, Multipath routing, Zone Routing Protocol, Dynamic Source Routing, 0202 electrical engineering, electronic engineering, information engineering, Multi-hop Wireless Routing, Geographic routing, Static routing, Policy-based routing, Computer network, Routing (electronic design automation), Wireless Sensor Networks: Survey and Applications, Mobile Ad Hoc Networks, Routing Techniques, Secure Routing, Computer science, Distributed computing, Routing protocol, Computer Science, Physical Sciences, Security in Wireless Sensor Networks, Wireless Routing Protocol, Wireless Sensor Networks, Wireless sensor network
-
6Academic Journal
Authors: Vijayendra K. H. Prasad, P Sasikumar
Source: International Journal of Distributed Sensor Networks, Vol 2023 (2023)
Linked Full TextSubject Terms: Wireless Home Automation Systems, Computer Networks and Communications, Energy-Efficient Protocols, Structural engineering, Node (physics), 02 engineering and technology, Mobile wireless sensor network, 7. Clean energy, Clustering Algorithms, Engineering, Cluster analysis, Machine learning, 11. Sustainability, FOS: Electrical engineering, electronic engineering, information engineering, 0202 electrical engineering, electronic engineering, information engineering, Base station, Efficient energy use, Electrical and Electronic Engineering, Wireless network, Key distribution in wireless sensor networks, Computer network, Routing (electronic design automation), Wireless Networks, Wireless Sensor Networks: Survey and Applications, Sensors, Sensor node, QA75.5-76.95, Computer science, Distributed computing, Routing protocol, Enhanced Data Rates for GSM Evolution, World Wide Web, Electronic computers. Computer science, Electrical engineering, Computer Science, Physical Sciences, Wireless, Telecommunications, Security in Wireless Sensor Networks, Wireless Sensor Networks, Wireless sensor network, The Internet
-
7Academic Journal
Authors: A. Venkatesh, S. Asha
Source: Computer Systems Science and Engineering. 45:1375-1392
Subject Terms: Computer Networks and Communications, Biomedical Engineering, Structural engineering, Node (physics), 02 engineering and technology, FOS: Medical engineering, 7. Clean energy, Engineering, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Packet forwarding, Computer network, Routing (electronic design automation), Wireless Networks, Wireless Sensor Networks: Survey and Applications, Intrusion detection system, Secure Routing, Wireless Nanosensor Networks, Computer science, Routing protocol, Overhead (engineering), Operating system, Computer Science, Physical Sciences, Security in Wireless Sensor Networks, Nanonetworks and Molecular Communication, Wireless Sensor Networks, Wireless sensor network
-
8Academic Journal
Authors: Vijayendra K. H. Prasad, P Sasikumar
Source: IEEE Access, Vol 11, Pp 145421-145440 (2023)
Linked Full TextSubject Terms: FOS: Computer and information sciences, Artificial intelligence, Computer Networks and Communications, Multipath routing, 7. Clean energy, Real-time computing, Cluster analysis, Engineering, Efficient energy use, scheduling, Applications and Challenges of IoT, Static routing, Computer network, Routing (electronic design automation), Wireless Networks, Cognitive Radio Networks and Smart Technologies, Secure Routing, WSN, Computer science, Distributed computing, TK1-9971, Routing protocol, Energy consumption, Enhanced Data Rates for GSM Evolution, Electrical engineering, Computer Science, Physical Sciences, multipath routing, Smart Farming, Electrical engineering. Electronics. Nuclear engineering, Security in Wireless Sensor Networks, Wireless Sensor Networks, Wireless sensor network, Quad tree-based network construction, clustering, Information Systems
-
9Academic Journal
Source: AIMS Mathematics, Vol 8, Iss 4, Pp 8310-8331 (2023)
Subject Terms: Wireless Home Automation Systems, Artificial intelligence, Computer Networks and Communications, Mobile Sensor Deployment, Structural engineering, Node (physics), 02 engineering and technology, 7. Clean energy, Clustering Algorithms, Engineering, Cluster analysis, QA1-939, FOS: Electrical engineering, electronic engineering, information engineering, 0202 electrical engineering, electronic engineering, information engineering, Base station, Efficient energy use, Electrical and Electronic Engineering, wireless sensor networks, energy efficiency, network lifetime, Computer network, Routing (electronic design automation), Wireless Sensor Networks: Survey and Applications, deec, Routing Techniques, Secure Routing, Computer science, Distributed computing, Routing protocol, Fuzzy logic, Energy consumption, routing, Electrical engineering, Computer Science, Physical Sciences, fuzzy logic, Security in Wireless Sensor Networks, Wireless Sensor Networks, Mathematics, Wireless sensor network, clustering
-
10Academic Journal
Authors: S. Sankar, Mary Subaja Christo, P. S. Uma Priyadarsini
Source: Intelligent Automation & Soft Computing. 35:2337-2351
Subject Terms: Ad Hoc Wireless Networks Research, Computer Networks and Communications, 02 engineering and technology, Wireless Mesh Networks, 7. Clean energy, 12. Responsible consumption, Database, Cluster analysis, Engineering, Machine learning, 0202 electrical engineering, electronic engineering, information engineering, Base station, Efficient energy use, Security in Wireless Networks, Computer network, Routing (electronic design automation), Wireless Sensor Networks: Survey and Applications, Network packet, Scalability, Secure Routing, Routing Techniques, Computer science, Distributed computing, Routing protocol, Overhead (engineering), Operating system, Electrical engineering, Computer Science, Physical Sciences, Security in Wireless Sensor Networks, Wireless Sensor Networks, Wireless sensor network
-
11Academic Journal
Robust and Lightweight Remote User Authentication Mechanism for Next-Generation IoT-Based Smart Home
Authors: Zeeshan Ashraf, Adnan Sohail, Abdul Hameed, Muhammad Farhan, Faiz Abdullah Alotaibi, Mrim M. Alnfiai
Source: IEEE Access, Vol 11, Pp 137899-137910 (2023)
Linked Full TextSubject Terms: FOS: Computer and information sciences, Smart objects, Smart Cards, smart home, Computer Networks and Communications, User Authentication Methods and Security Measures, IPv6, IoT security, Internet of Things, Encryption, Remote User Authentication, 7. Clean energy, Computer security, Embedded system, security analysis, Security Protocols for Authentication and Key Exchange, Authentication, 6LoWPAN, Computer network, 9. Industry and infrastructure, Home automation, key exchange, Continuous Authentication, NGN, Secure Routing, Computer science, TK1-9971, Operating system, Authentication (law), Secure communication, Computer Science, Physical Sciences, Telecommunications, Electrical engineering. Electronics. Nuclear engineering, Security in Wireless Sensor Networks, Authentication protocol, IPv6 address, The Internet, Information Systems
-
12Academic Journal
Authors: S. Maheswari, R. Vijayabhasker
Source: Intelligent Automation & Soft Computing. 35:3677-3692
Subject Terms: Ad Hoc Wireless Networks Research, Artificial intelligence, Subjective logic, Sociology and Political Science, Computer Networks and Communications, Social Sciences, Structural engineering, Node (physics), Link-state routing protocol, 02 engineering and technology, 7. Clean energy, Engineering, Quality of service, Sociology, Computer security, Trust and Reputation Systems in Online Environments, 0202 electrical engineering, electronic engineering, information engineering, Ad Hoc Networks, Reputation, Probabilistic logic, Computer network, Network packet, Mobile Ad Hoc Networks, Trust Management, Packet drop attack, Social science, Computer science, Intrusion Detection, Routing protocol, FOS: Sociology, Fuzzy logic, Mobile ad hoc network, Attack Detection, Computer Science, Physical Sciences, Security in Wireless Sensor Networks
-
13Academic Journal
Authors: A. Bhavani, V. Nithya
Source: Intelligent Automation & Soft Computing. 36:1381-1393
Subject Terms: FOS: Computer and information sciences, IoT Security, Computer Networks and Communications, User Authentication Methods and Security Measures, Encryption, Message authentication code, 7. Clean energy, Computer security, Authentication, Computer network, Internet of Things and Edge Computing, Continuous Authentication, Secure Routing, Public-key cryptography, Computer science, Session (web analytics), Intrusion Detection, Elliptic curve cryptography, World Wide Web, Authentication (law), Computer Science, Physical Sciences, Hash function, Cryptography, Security in Wireless Sensor Networks, Session key, Wireless sensor network, Information Systems
-
14Academic Journal
Authors: Ala Mughaid, Ibrahim Obaidat, Ashraf H. Aljammal, Shadi AlZu'bi, Fatima Quiam, Dena Abu Laila, Aseel Al-zou'bi, Laith Abualigah
Source: International Journal of Data and Network Science, Vol 7, Iss 2, Pp 757-764 (2023)
Subject Terms: Ad Hoc Wireless Networks Research, Denial-of-service attack, Computer Networks and Communications, Routing Protocols, Social Sciences, Structural engineering, Node (physics), 7. Clean energy, Engineering, Management. Industrial management, Wireless network, Ad Hoc Networks, DDoS Attacks, Computer network, Packet loss, Network packet, Mobile Ad Hoc Networks, Secure Routing, Wireless ad hoc network, HD28-70, 16. Peace & justice, Computer science, Throughput, Vehicular ad hoc network, Distributed computing, Routing protocol, World Wide Web, Mobile ad hoc network, Computer Science, Physical Sciences, Network Intrusion Detection and Defense Mechanisms, Wireless, Telecommunications, Security in Wireless Sensor Networks, Optimized Link State Routing Protocol, The Internet
-
15Academic Journal
Authors: S. Sankar, S. Revathi, R. Thiagarajan
Source: Computer Systems Science and Engineering. 45:625-640
Subject Terms: Exploit, Certification, Computer Networks and Communications, FOS: Political science, Encryption, Structural engineering, FOS: Law, Remote User Authentication, Node (physics), 02 engineering and technology, 7. Clean energy, Engineering, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Key (lock), Political science, Wireless network, Key distribution in wireless sensor networks, Security Protocols for Authentication and Key Exchange, Authentication, Computer network, Wireless Sensor Networks: Survey and Applications, Secure Routing, Sensor node, Public-key cryptography, Computer science, Intrusion Detection, Attack Detection, Authentication (law), Computer Science, Physical Sciences, Wireless, Telecommunications, Security in Wireless Sensor Networks, Law, Wireless sensor network
-
16Academic Journal
Authors: S. Neelavathy Pari, K. Sudharson
Source: Intelligent Automation & Soft Computing. 35:2541-2554
Subject Terms: Ad Hoc Wireless Networks Research, Trust management (information system), Computer Networks and Communications, Routing Protocols, FOS: Political science, Structural engineering, FOS: Law, Vehicular Ad Hoc Networks, Node (physics), 02 engineering and technology, 7. Clean energy, Engineering, Sociology, Computer security, FOS: Electrical engineering, electronic engineering, information engineering, 0202 electrical engineering, electronic engineering, information engineering, Electrical and Electronic Engineering, Political science, Reputation, Computer network, Routing (electronic design automation), Network packet, Mobile Ad Hoc Networks, Secure Routing, Harm, Social science, 16. Peace & justice, Computer science, Throughput, Routing protocol, FOS: Sociology, Attack Detection, Computer Science, Physical Sciences, Wireless, Telecommunications, Vehicular Ad Hoc Networks and Communications, Security in Wireless Sensor Networks, Law
-
17Academic Journal
Authors: S. Soundararajan, R. Prabha, Mr. R. Baskar, T. J. Nagalakshmi
Source: Intelligent Automation & Soft Computing. 36:267-280
Subject Terms: Security in Wireless Networks, Ad Hoc Wireless Networks Research, Computer network, Routing (electronic design automation), Network packet, Computer Networks and Communications, Mobile Ad Hoc Networks, Routing Protocols, Secure Routing, 16. Peace & justice, Computer science, 7. Clean energy, Distributed computing, Routing protocol, Quality of service, Mobile ad hoc network, Computer Science, Physical Sciences, Delay-Tolerant Networking in Mobile Ad Hoc Networks, Security in Wireless Sensor Networks, Opportunistic Routing
-
18Academic Journal
Authors: S. Soundararajan, B. R. Tapas Bapu, C. Kotteeswaran, Suresh Venkatasubramanian, Parveen Kumar, Ahmed Mudassar Ali
Source: Intelligent Automation & Soft Computing. 36:1227-1240
Subject Terms: Computer network, Routing (electronic design automation), Wireless Sensor Networks: Survey and Applications, Network packet, Computer Networks and Communications, Secure Routing, Structural engineering, Node (physics), Computer science, 7. Clean energy, Intrusion Detection, Ad hoc On-Demand Distance Vector Routing, Routing protocol, Engineering, Attack Detection, Computer security, Computer Science, Physical Sciences, Network Intrusion Detection and Defense Mechanisms, Dynamic Source Routing, Security in Wireless Sensor Networks, Wireless Sensor Networks, Distance-vector routing protocol, DDoS Attacks
-
19Academic Journal
Authors: K. Ramesh, P. N. Renjith, M. AntoBennet, S. Balasubramani
Source: International Journal of Electrical and Electronics Research. 10:1043-1049
Subject Terms: Alternative medicine, Computer Networks and Communications, Energy-Efficient Protocols, Mobile Sensor Deployment, Cluster (spacecraft), 02 engineering and technology, 7. Clean energy, Cluster analysis, Machine learning, Pathology, 0202 electrical engineering, electronic engineering, information engineering, Base station, Computer network, Routing (electronic design automation), Wireless Networks, Wireless Sensor Networks: Survey and Applications, Internet of Things and Edge Computing, Secure Routing, Computer science, Distributed computing, Routing protocol, Computer Science, Physical Sciences, Protocol (science), Medicine, Security in Wireless Sensor Networks, Wireless Sensor Networks, Wireless sensor network
-
20Academic Journal
Authors: V. Chandrasekar, V. Shanmugavalli, T R Mahesh, R. Shashikumar, Naiwrita Borah, V. Vinoth Kumar, Suresh Guluwadi
Source: Sci Rep
Scientific Reports, Vol 14, Iss 1, Pp 1-16 (2024)Subject Terms: Ad Hoc Wireless Networks Research, Computer Networks and Communications, Science, Unmanned Aerial Vehicle Communications, TAODV, Aerospace Engineering, FOS: Mechanical engineering, Structural engineering, 02 engineering and technology, Node (physics), 7. Clean energy, Article, Ad hoc On-Demand Distance Vector Routing, Engineering, 0202 electrical engineering, electronic engineering, information engineering, Ad Hoc Networks, Flying ad-hoc network, Security in Wireless Networks, Malicious node, Computer network, Network packet, Mobile Ad Hoc Networks, Secure Routing, Wireless ad hoc network, Computer science, Throughput, Routing protocol, Mobile ad hoc network, Attack Detection, Physical Sciences, Computer Science, Secure AODV, Wireless, Telecommunications, Medicine, AODV, Security in Wireless Sensor Networks, Distance-vector routing protocol, Optimized Link State Routing Protocol
Linked Full TextAccess URL: https://pubmed.ncbi.nlm.nih.gov/38570527
https://doaj.org/article/ed193b47338e47b5978dd28d39acff0e