Mobile ad hoc network requires lots of attention towards secure reputed routing. This paper proposed a novel reputed e-ARAN scheme to detect and handle authenticated selfish nodes, based on reputed OCEAN scheme. With description of all four phases of reputed e-ARAN it also proves that the proposed scheme gives better end-to-end delay and throughput as […]
Optimizing throughput with reduction in power consumption and performance comparison of DSR and AODV routing protocols
The main objective of the paper is to increase the throughput thereby reducing the Network Load and end to end delay between nodes. To achieve this, it is proposed to go for reactive routing protocols. Proactive routing protocols use table-driven strategy that is the routing tables are exchanged periodically between nodes which lead to more […]
SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
With the pervasiveness of smart phones and the advance of wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this […]
The Intrusion Detection in Mobile Sensor Network
Intrusion detection is an important problem in sensor networks. Prior works in static sensor environments show that constructing sensor barriers with random sensor deployment can be effective for intrusion detection. In response to the recent surge of interest in mobile sensor applications, this paper studies the intrusion detection problem in a mobile sensor network, where […]
Mobility Increases the Connectivity of Wireless Networks
In this paper, we investigate the connectivity for large-scale clustered wireless sensor and ad hoc networks. We study the effect of mobility on the critical transmission range for asymptotic connectivity inĀ $k$-hop clustered networks and compare to existing results on nonclustered stationary networks. By introducingĀ $k$-hop clustering, any packet from a cluster member can reach a cluster […]