JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing syst...
Main Authors: | Khan, Burhan Ul Islam, Zulkurnain, Nurul Fariza, Olanrewaju, Rashidah Funke, Nissar, Gousia, Baba, Asifa Mehraj, Lone, Sajad Ahmad |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
Springer, Cham
2017
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/58190/ http://irep.iium.edu.my/58190/ http://irep.iium.edu.my/58190/ http://irep.iium.edu.my/58190/1/58190_JIR2TA-%20Joint%20Invocation%20of%20Resource-Based.pdf |
Similar Items
-
STCM: secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2016) -
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017) -
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015) -
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015) -
SSM: Secure-Split-Merge data distribution in cloud infrastructure
by: Khan, Burhan ul Islam, et al.
Published: (2015)