Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Performance evaluation of anonymous routing protocols in MANETs. Abstract: Mobile ad hoc networks require anonymous communications in order to thwart new ...
Abstract—. Mobile ad hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect.
People also ask
This paper reports the experimental results of the analysis of routing intrusions and vulnerabilities in wireless ad hoc networks. A mobile ad hoc network test ...
Mar 1, 2012 · In this paper we present a Trusted Anonymous Routing (TARo) protocol [18] that provides a high level of anonymity for network nodes and ensures ...
Anonymous routing protocols in MANETs, a security comparative analysis. By. El-Zoghby A.M.. Mosharafa A. Azer M.A.. Circuit Theory and Applications · Software ...
Nov 20, 2021 · This paper provides a review on ... [Show full abstract] efficient anonymous routing protocols used in MANET and also compares the security in ...
In this paper, we propose an efficient anonymous routing protocol that uses a mobile agent paradigm for wireless and mobile ad hoc networks. In our protocol, ...
Missing: protocols | Show results with:protocols
A protected algorithm to preclude the information from black hole attacks in the MANET routing protocols is proposed via the method of ant colony ...
Results were presented as a function of three performance metrics namely: throughput, delay and network load. In most simulations and overall, DSR and AODV ...
Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols ... various anonymous routing protocols are reviewed and performance of such protocols can be ...