Learn More
In this paper, a robust distributed malicious node detection and precise localization and tracking method is proposed for Cluster based Mobile Ad hoc Network (MANET). Certificate Authority (CA) node is selected as the most stable node among trusted nodes, surrounded by Registration Authority nodes (RAs) in each cluster to generate the Dynamic Demilitarized(More)
— Dynamic Position Location and Tracking (PL&T) is proposed deploying the integrated approach of zone finding and triangulation using two friendly nodes equipped with Steered Directional Antenna (DA) in Mobile Ad hoc Networks (MANET). This approach allows the system to use only two references instead of a typical 3 references for a straight triangulation.(More)
Secured opportunistic Medium Access Control (MAC) and complexity reduction in channel estimation are proposed in the Cross layer design Cognitive Radio Networks deploying the secured dynamic channel allocation from the endorsed channel reservation. Channel Endorsement and Transmission policy is deployed to optimize the free channel selection as well as(More)
—A novel Strict Friendliness Verification (SFV) scheme based on the integrated key consisting of symmetric node identity, geographic location and round trip response time between the sender and the receiver radio in MANET is proposed. This key is dynamically updated for encryption and decryption of each packet to resolve Wormhole attack and Sybil attack.(More)
The nature of predetermined and on-demand mobile network fabrics can be exploited for Position Real time Location Tracking (PL&T) of radios and sensors (nodes) for Global Positioning System (GPS) denied or GPS-free systems. This issue is addressed by a novel system of integrating zone finding and triangulation method for determining the PL&T of nodes when(More)
A novel approach of the integrated security and dynamic Position Location and Tracking (PL&T) for malicious node maintaining two friendly nodes is proposed. Location based hash security scheme is deployed for detection of friendly and malicious nodes by encrypting hash functions using private location assets to increase the security level. In addition, PL&T(More)
The next generation wearable devices are Smart health monitoring device and Smart sousveillance hat which are capable of using wearable sensors for measuring physiological information, sousveillanace, navigation, as well as smart device to smart device communications over cellular coverage. Smart health monitoring device collect and observe different health(More)
Next generation wearable devices such as Smart health monitoring device and Smart Sousveillance hat, are capable of using wearable sensors for measuring physiological information, sousveillanace, navigation, as well as smart device to smart device communications. Smart health monitoring device collect and observe different health related information(More)