To see the other types of publications on this topic, follow the link: Secure Routing with Localized Key Management Protocol.

Journal articles on the topic 'Secure Routing with Localized Key Management Protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 28 journal articles for your research on the topic 'Secure Routing with Localized Key Management Protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jayaprakash, R., and B. Radha. "An Implementation of Trusted Key Management Protocol (TKMP) in Wireless Network." Journal of Computational and Theoretical Nanoscience 17, no. 12 (2020): 5243–49. http://dx.doi.org/10.1166/jctn.2020.9415.

Full text
Abstract:
The Trusted Key Management Protocol (TKMP) provides one of the most secure communication technologies in MANET cluster-based data protection. For security reasons, TKMP is a trusted key that can be sent to all nodes in the communication cluster. This document introduces the Trusted Key Management Protocol (TKMP) feature to improve the quality of secure communications over a cluster-based wireless network. The proposed TKMP execution process includes CBPPRS (Cluster Based Privacy Preserving Routing Selection), LBCPR (Load Balancing Cluster Based Privacy Routing) and DLBPS (Dynamic Load Balancin
APA, Harvard, Vancouver, ISO, and other styles
2

Rathee, Geetanjali, and Hemraj Saini. "Secure Buffer-Based Routing Protocol for WMN." International Journal of Business Data Communications and Networking 13, no. 1 (2017): 28–44. http://dx.doi.org/10.4018/ijbdcn.2017010103.

Full text
Abstract:
Secure routing is considered as one of a key challenge in mesh networks because of its dynamic and broadcasting nature. The broadcasting nature of mesh environment invites number of security vulnerabilities to come and affect the network metrics drastically. Further, any node/link failure of a routed path may reduce the performance of the entire network. A number of secure routing protocols have been proposed by different researchers but enhancement of a single network parameter (i.e. security) may affect another performance metrics significantly i.e. throughput, end to end delay, packet deliv
APA, Harvard, Vancouver, ISO, and other styles
3

Yu, Zhe Fu, Hai Gang Zhou, and Zhao Feng Wu. "A Secure Routing Protocol Based on Certificateless Signcryption for Satellite Networks." Advanced Materials Research 546-547 (July 2012): 1065–70. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1065.

Full text
Abstract:
The article introduces a certificateless signcryption scheme targeting the problem of lacking of security mechanism in the routing of satellite networks, and designs a secure routing protocol suitable for the satellite networks. The proposed protocol avoids complicated management in the certificate mechanism and bypasses the key escrow problem in the identity-based cryptography using the certificateless cryptography and signcryption. The analysis shows that the new protocol can resist several common attacks, effectively improve the security of the satellite networks routing.
APA, Harvard, Vancouver, ISO, and other styles
4

Kaur, Jugminder, Sandeep S. Gill, and Balwinder S. Dhaliwal. "Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks." Journal of Engineering 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/2089714.

Full text
Abstract:
Security is always a major concern in wireless sensor networks (WSNs). Several trust based routing protocols are designed that play an important role in enhancing the performance of a wireless network. However they still have some disadvantages like limited energy resources, susceptibility to physical capture, and little protection against various attacks due to insecure wireless communication channels. This paper presents a secure trust based key management (STKF) routing framework that establishes a secure trustworthy route depending upon the present and past node to node interactions. This
APA, Harvard, Vancouver, ISO, and other styles
5

K.R, Shibu, and Suji Pramila R. "Routing protocol based key management schemes in manet: a survey." International Journal of Engineering & Technology 7, no. 3 (2018): 1453. http://dx.doi.org/10.14419/ijet.v7i3.14219.

Full text
Abstract:
Mobile ad-hoc networks (MANETS) are infrastructure less networks and the topology of this network is always changing. The nodes can enter and leave the network at any time. These networks require a high security in communication, as its application demands so. Effective key management is the only technique, which can implement to secure the nodes in communication. In adhocnetworks there is no central controller or router such as in wired network. This will make this network more vulnerable to attack. The intruders can easily enter the net-work and can manipulate the contents easily. Traditiona
APA, Harvard, Vancouver, ISO, and other styles
6

Fernandes, Natalia Castro, and Otto Carlos Muniz Bandeira Duarte. "A lightweight group-key management protocol for secure ad-hoc-network routing." Computer Networks 55, no. 3 (2011): 759–78. http://dx.doi.org/10.1016/j.comnet.2010.10.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bondada, Praveen, Debabrata Samanta, Manjit Kaur, and Heung-No Lee. "Data Security-Based Routing in MANETs Using Key Management Mechanism." Applied Sciences 12, no. 3 (2022): 1041. http://dx.doi.org/10.3390/app12031041.

Full text
Abstract:
A Mobile Ad Hoc Network (MANET) is an autonomous network developed using wireless mobile nodes without the support of any kind of infrastructure. In a MANET, nodes can communicate with each other freely and dynamically. However, MANETs are prone to serious security threats that are difficult to resist using the existing security approaches. Therefore, various secure routing protocols have been developed to strengthen the security of MANETs. In this paper, a secure and energy-efficient routing protocol is proposed by using group key management. Asymmetric key cryptography is used, which involve
APA, Harvard, Vancouver, ISO, and other styles
8

Kamboj, Nippun, Dalip, and Munishwar Rai. "A New Secure Ad-Hoc on Demand Distance Vector Routing Protocol to Ensure Less Power Consumption in Mobile Ad-Hoc Network." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2483–87. http://dx.doi.org/10.1166/jctn.2020.8919.

Full text
Abstract:
Current time represents the era of communication technology and in this revolution MANET is widely used and act as a key star for data communication in real life decisive scenario for e.g., disaster management, traffic control, military services etc. MANET is infrastructureless data communication network comprising of mobile nodes. For MANET it requires secure and energy efficient framework for the underlying routing protocol. To meet the need of efficient data communication in MANET, an Energy Efficient and Secure AODV (EES-AODV) protocol is proposed. In the projected routing protocol, first
APA, Harvard, Vancouver, ISO, and other styles
9

LIN, H. Y. "Resilient Cluster-Organizing Key Management and Secure Routing Protocol for Mobile Ad Hoc Networks." IEICE Transactions on Communications E88-B, no. 9 (2005): 3598–613. http://dx.doi.org/10.1093/ietcom/e88-b.9.3598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Iqbal, J. L. Mazher, and G. L. Anil. "Secure Energy Efficient Network Priority Routing Protocol for Effective Data Collection and Key Management in Dynamic WSNs." International Journal of Information and Computer Security 13, no. 2 (2020): 1. http://dx.doi.org/10.1504/ijics.2020.10023138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Anil, G. L., and J. L. Mazher Iqbal. "Secure energy efficient network priority routing protocol for effective data collection and key management in dynamic WSNs." International Journal of Information and Computer Security 14, no. 1 (2021): 60. http://dx.doi.org/10.1504/ijics.2021.112208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Hussein, Safwan Mawlood, Juan Antonio López Ramos, and Abubakar Muhammad Ashir. "A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks." Electronics 11, no. 17 (2022): 2721. http://dx.doi.org/10.3390/electronics11172721.

Full text
Abstract:
The rapid growth of technology has resulted in the deployment of a large number of interconnected devices, resulting in a wide range of new societal services. Wireless sensor networks (WSNs) are a promising technology which is faced with the challenges of operating a large number of sensor nodes, information gathering, data transmission, and providing a means to act in different scenarios such as monitoring, surveillance, forest fire detection, and many others from the civil to military spectrum. The deployment scenario, the nature of the sensor-equipped nodes, and their communication methods
APA, Harvard, Vancouver, ISO, and other styles
13

Yamparala, Rajesh, and Sankara Narayanan Selvaraj Pandian. "A Neighbor Trust Weight Based Cryptography for Multi Key Distribution for Improving Quality of Service in MANETS." Ingénierie des systèmes d information 27, no. 5 (2022): 757–65. http://dx.doi.org/10.18280/isi.270508.

Full text
Abstract:
A Mobile Ad-Hoc Network (MANET) is a self-configuring network that provides temporary connections to several wireless nodes. Trust mechanisms are employed in routing protocols to quickly locate a safe path. Because of its openness and complexity, MANET can be attacked in a number of ways. To begin mitigating potential security risks, a number of different cryptographic key generation strategies are explored. A key management system for MANET security is available with different encryption techniques. Identity with Trust Level based Cryptography Model (ITLCM) is used to generate multiple keys a
APA, Harvard, Vancouver, ISO, and other styles
14

Albakri, Ashwag, Reem Alshahrani, Fares Alharbi, and Saahira Banu Ahamed. "Fully Homomorphic Encryption with Optimal Key Generation Secure Group Communication in Internet of Things Environment." Applied Sciences 13, no. 10 (2023): 6055. http://dx.doi.org/10.3390/app13106055.

Full text
Abstract:
The Internet of Things or “IoT” determines the highly interconnected network of heterogeneous devices where each type of communication seems to be possible, even unauthorized. Consequently, the security requirement for these networks became crucial, while conventional Internet security protocol was identified as unusable in these types of networks, especially because of some classes of IoT devices with constrained resources. Secure group communication (SGC) in the IoT environment is vital to ensure the confidentiality, integrity, and availability (CIA) of data swapped within a collection of Io
APA, Harvard, Vancouver, ISO, and other styles
15

Degefa, Fikadu, Jihyeon Ryu, Hyoungshick Kim, and Dongho Won. "MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks*^." PLOS ONE 17, no. 5 (2022): e0262696. http://dx.doi.org/10.1371/journal.pone.0262696.

Full text
Abstract:
Fast Proxy Mobile IPv6 (FPMIPv6) is an extension of the PMIPv6 mobility management deployed as part of the next-generation internet protocol. It allows location-independent routing of IP datagrams, based on local mobility to IPv6 hosts without involvement of stations in the IP address signaling. A mobile node keeps its IP address constant as it moves from link to link, which avoids signaling overhead and latency associated with changing IP address. Even though local mobility requirements hold, it entails security threats such as Mobile Node, Mobile Access Gateway, as well as Local Mobility Anc
APA, Harvard, Vancouver, ISO, and other styles
16

Latif, Rana Muhammad Amir, Muhammad Jamil, Jinliao He, and Muhammad Farhan. "A Novel Authentication and Communication Protocol for Urban Traffic Monitoring in VANETs Based on Cluster Management." Systems 11, no. 7 (2023): 322. http://dx.doi.org/10.3390/systems11070322.

Full text
Abstract:
City zones have become increasingly overcrowded due to the extensive population widening ratio and the swift relocation of people from villages. The traffic monitoring process is a significant issue in these areas due to the massive traffic flow on the roads. This research proposed a cluster-based improved authentication and communication protocol for an Intelligent Transportation System in Vehicular AdHoc Networks (VANETs). Our primary objective is to optimize resource sharing in vehicular communication. We enhanced the reliability, scalability, and stability of fast-moving VANETs by introduc
APA, Harvard, Vancouver, ISO, and other styles
17

Nagaraja, G. S., K. Vanishree, and Farooque Azam. "Novel Framework for Secure Data Aggregation in Precision Agriculture with Extensive Energy Efficiency." Journal of Computer Networks and Communications 2023 (February 24, 2023): 1–11. http://dx.doi.org/10.1155/2023/5926294.

Full text
Abstract:
Precision agriculture (PA) is the next generation of a technological revolution in smart farming, where sensing technology is the core technological player. Energy-efficient data transmission in PA via sensing technology is possible only when additional security measures are synchronized. Nevertheless, security considerations often introduce additional overhead. Thus, it is necessary to develop an efficient mechanism to achieve an optimal trade-off between security and resource efficiency. The prime purpose of the proposed study is to introduce a lightweight communication protocol that can ens
APA, Harvard, Vancouver, ISO, and other styles
18

Tsai, Pang-Wei, Aris Cahyadi Risdianto, Meng Hui Choi, Satis Kumar Permal, and Teck Chaw Ling. "SD-BROV: An Enhanced BGP Hijacking Protection with Route Validation in Software-Defined eXchange." Future Internet 13, no. 7 (2021): 171. http://dx.doi.org/10.3390/fi13070171.

Full text
Abstract:
In global networks, Border Gateway Protocol (BGP) is widely used in exchanging routing information. While the original design of BGP did not focus on security protection against deliberate or accidental errors regarding to routing disruption, one of fundamental vulnerabilities in BGP is a lack of insurance in validating authority for announcing network layer reachability. Therefore, a distributed repository system known as Resource Public Key Infrastructure (RPKI) has been utilized to mitigate this issue. However, such a validation requires further deployment steps for Autonomous System (AS),
APA, Harvard, Vancouver, ISO, and other styles
19

"Implementation of Secure Energy Efficient Network Priority Routing(SEENPR) Protocol with Secure Key Management in WSN." International Journal of Recent Technology and Engineering 8, no. 2S11 (2019): 3096–103. http://dx.doi.org/10.35940/ijrte.b1403.0982s1119.

Full text
Abstract:
Wireless sensor networks (WSNs) consist of sensor nodes, which act as source and link nodes through which the data forward to sink node. However, the nodes in network have limited computation complexity, transmission capability and restricted battery life. Several routing protocols are available to improve the performance of network but very few concentrates on security issues. The performance of routing and security protocol in WSN affect due to unreliable low power links, insecure communication, threats, and resource limitations which limits the design of an efficient routing and security al
APA, Harvard, Vancouver, ISO, and other styles
20

Bhadane, Yugashree, and Pooja Kadam. "A Survey on Hierarchical Cluster Based Secure Routing Protocols and Key Management Schemes in Wireless Sensor Networks." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, November 15, 2018, 18–26. http://dx.doi.org/10.32628/cseit183810.

Full text
Abstract:
Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hier
APA, Harvard, Vancouver, ISO, and other styles
21

Rama Devi, G. R., M. Swamy Das, and M. V. Ramana Murthy. "Secure cross-layer routing protocol with authentication key management scheme for manets." Measurement: Sensors, July 2023, 100869. http://dx.doi.org/10.1016/j.measen.2023.100869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Khan, Adnan Shahid, Halikul Lenando, Johari Abdullah, and Norsheila Fisal. "Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks." Jurnal Teknologi 73, no. 1 (2015). http://dx.doi.org/10.11113/jt.v73.3258.

Full text
Abstract:
Mobile Multihop Relay (MMR) network is one of the emerging technologies, especially LTE-Advanced, WiMAX and the Smart grid communications. Ensuring security is one of the most imperative and challenging issues in MMR networks. Privacy Key Management (PKM) protocol is proposed to ensure the security measures in MMR networks. However, the protocol still faces several security threats, specifically Denial of Service (DoS), replay attacks, Man in the Middle (MitM) attacks and the interleaving attacks, which is termed as Medium Access Control (MAC) layer attacks. This paper proposed a modified vers
APA, Harvard, Vancouver, ISO, and other styles
23

Jain, Prateek, and Rupsha Bagchi. "SMART: A Secure Multipath Anonymous Routing Technique." International Journal of Smart Sensor and Adhoc Network., October 2011, 117–22. http://dx.doi.org/10.47893/ijssan.2011.1034.

Full text
Abstract:
Multipath routing for mobile Ad hoc networks is a technique of concurrent management and utilization of multiple paths for transmitting distributed data evenly across the nodes instead of routing all the traffic along a single path, potentially resulting in longer lifetime along with the benefits of better transmission performance, fault tolerance, increased bandwidth and improved security. In this paper, a secure multipath anonymous routing protocol (abbreviated as SMART) has been proposed. SMART uses non cryptographic ways to help the source find the routes to the destination and dynamic oni
APA, Harvard, Vancouver, ISO, and other styles
24

So, Yick Hon Joseph, Jidong Wang, and Deddy Chandra. "Secure Mobile IP with HIP Style Handshaking and Readdressing for public-key based IP network." African Journal of Information & Communication Technology 2, no. 3 (2006). http://dx.doi.org/10.5130/ajict.v2i3.229.

Full text
Abstract:
Mobile IP allows a mobile node to roam into a
 foreign IP network without losing its connection with its
 peer. Mobile IPv6 uses Route Optimization to improve the routing performance by avoiding the triangle routing problem and adopting Return Routability as a secure process for binding update. Host Identity Protocol (HIP) is an experimental security protocol which provides mobility management and multi-homing with new namespace. HIP has a similar architecture to the Mobile IP with Route Optimization. In this paper, we introduce a Secure Mobile IP with HIP Style Handshaking and Readd
APA, Harvard, Vancouver, ISO, and other styles
25

"Secure Trust Aware Hybrid Key Management Routing Protocol for WSNs for the Application of IoT." International Journal of Innovative Technology and Exploring Engineering 8, no. 9S4 (2019): 104–10. http://dx.doi.org/10.35940/ijitee.i1115.0789s419.

Full text
Abstract:
Secure Trust Based Key Management Framework for Wireless Sensor Networks (WSNs) to protect the forwarded packets from intermediary malicious nodes. The proposed method continuously ensures the trustworthiness of cluster heads by replacing them as soon as they become malicious and can dynamically update the packet path to avoid malicious routes. Unlike the other methods, the process is distributed among the nodes to minimize routing overhead and to conserve energy. The fundamental process of moving node to non-switchable Low Power Listening (LPL) state assists energy conservation. Trust based n
APA, Harvard, Vancouver, ISO, and other styles
26

"An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network." KSII Transactions on Internet and Information Systems 15, no. 10 (2021). http://dx.doi.org/10.3837/tiis.2021.10.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

"Reliable AODV for DANET using Homomorphic Encryption Scheme." International Journal of Recent Technology and Engineering 8, no. 4 (2019): 11529–33. http://dx.doi.org/10.35940/ijrte.d4384.118419.

Full text
Abstract:
DANETs, when compared to MANETs, have high network density and mobility over time. To maintain a secure communication over DANET, requires the knowledge of mobility and complex key management scheme based on the topology change. Operation of DANETs can be categorized into two types based on the activity: 1. Activities requiring small key length 2. Activities requiring large key length. For disaster detection and emergency rescues, key length with reduced size (partial authentication mechanism) is preferable, whereas military operation or critical data sharing needs larger key size (complete au
APA, Harvard, Vancouver, ISO, and other styles
28

"E2-SCRP: An Energy Efficient Secure Clusterbased Routing Protocol for 3D Underwater Acoustic MANET (UWMANET)." International Journal of Innovative Technology and Exploring Engineering 8, no. 11 (2019): 2430–42. http://dx.doi.org/10.35940/ijitee.k1391.0981119.

Full text
Abstract:
In the current years, Underwater Mobile Ad hoc Network (UWMANET) has emerged as an enthusiastic field for supporting disaster prevention applications (Climate and Weather Observation, Earthquakes in Ocean (Tsunamis), underwater level navigation and tracking). In UWMANET, conventional data transmission methods have certain drawbacks such as high energy consumption, packet loss rate and end-toend delay. Nowadays, mobile node i.e. Autonomous Underwater Vehicle (AUV) is widely used for data collection from underwater sensors, which act as a relay between sensor node and surface sink. Security is a
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!