scholarly journals Localized Algorithm for Segregation of Critical/Non-critical Nodes in Mobile Ad Hoc and Sensor Networks

2013 ◽  
Vol 19 ◽  
pp. 1167-1172 ◽  
Author(s):  
Muhammad Imran ◽  
Mohamed A. Alnuem ◽  
Mahmoud S. Fayed ◽  
Atif Alamri
2011 ◽  
Vol 30 (12) ◽  
pp. 3158-3160
Author(s):  
Jia YU ◽  
Ying-you WEN ◽  
Hong ZHAO
Keyword(s):  
Ad Hoc ◽  

2014 ◽  
Vol 2014 ◽  
pp. 1-12 ◽  
Author(s):  
B. Sivakumar ◽  
N. Bhalaji ◽  
D. Sivakumar

In mobile ad hoc networks connectivity is always an issue of concern. Due to dynamism in the behavior of mobile nodes, efficiency shall be achieved only with the assumption of good network infrastructure. Presence of critical links results in deterioration which should be detected in advance to retain the prevailing communication setup. This paper discusses a short survey on the specialized algorithms and protocols related to energy efficient load balancing for critical link detection in the recent literature. This paper also suggests a machine learning based hybrid power-aware approach for handling critical nodes via load balancing.


2012 ◽  
pp. 864-892
Author(s):  
Jianmin Chen ◽  
Jie Wu

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.


Sign in / Sign up

Export Citation Format

Share Document