Routing Protocols in Mobile Ad-hoc Networks \
This paper presents the traces of communication between different mobile nodes using Routing Protocols in MANETs and analyzes the simulation results by graphical manner and trace file based on QoS metrics such as Throughput, Drop, Delay, Jitter etc.
Collaboration of Drone and Internet of Public Safety Things in Smart Cities: An Overview of QoS and Network Performance Optimization
The network performance of collaboration between drones and IoPST devices establishes a public safety network that shows satisfying results in terms of enhancing efficiency and information accuracy.
Multi-hop wireless ad-hoc network routing protocols- a comparative study of DSDV, TORA, DSR and AODV
- M. Yadav, S. Gupta, R. K. Saket
- Computer ScienceInternational Conference on Electrical…
- 10 September 2015
A lot of packet-level simulation to compare the four routing protocols namely: DSDV, TORA, DSR, and AODV, using mobility model is random waypoint model and two performance metrics: packet delivery ratio and routing overheads have been used.
PERFORMANCE METRIC COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN MANETs USING NS-2
A network simulator-2 (NS-2) called MobiREAL simulator has been designed and developed for performance evaluation of AODV and DSDV routing protocol and the results were analyzed based on Quality of Service (QoS) metrics: such as throughput, drop, delay and jitter.
Packet-Hiding Methods for Preventing Selective Jamming Attacks
This work addresses the problem of selective jamming attacks in wireless networks by developing three schemes that prevent real-time packet classification by combining cryptographic primit ives with physical-layer attributes and demonstrating the security of these methods.
Securing communication by attribute-based authentication in HetNet used for medical applications
- Tufail A. Lone, Aabid Rashid, A. Singhal
- Computer ScienceEURASIP Journal on Wireless Communications and…
- 14 July 2020
An attribute-based encryption (ABE) authentication scheme for securing health data in medical applications is utilizes, with the help of this method, access to the intruders is denied which results in reduced communication overhead.
Multi-Drone Edge Intelligence and SAR Smart Wearable Devices for Emergency Communication
- S. Alsamhi, Faris. A. Almalki, Brian Lee
- Computer ScienceWireless Communications and Mobile Computing
- 3 November 2021
It is shown that network performance can have significant improvement when the abovementioned parameters are correctly optimised, and the improved performance can significantly improve the guiding/coordinating of search and rescue teams effectively and efficiently.
Survey on FSO Communication System—Limitations and Enhancement Techniques
Free-space optical (FSO) communication is a line-of-sight communication in which the data modulates the infrared or visible laser light through the air from transmitter to receiver. FSO ensures fast,…
Heterogeneous Signcryption Scheme Supporting Equality Test from PKI to CLC toward IoT
- Yingzhe Hou, Xin Huang, Yanan Chen, S. Gupta, H. Xiong
- Computer ScienceTransactions on Emerging Telecommunications…
- 10 December 2020
A heterogeneous signcryption protocol supporting the equality test from public key infrastructure (PKI) to certificateless cryptosystem (CLC) toward IoT environment (PK‐CLET), which not only preserves the integrity, confidentiality and unforgeability of data, but also allows the cloud server to perform the Equality test on different ciphertexts.
Tethered Balloon Technology in Design Solutions for Rescue and Relief Team Emergency Communication Services
- S. Alsamhi, M. Ansari, O. Ma, Faris. A. Almalki, S. Gupta
- Computer ScienceDisaster Medicine and Public Health Preparedness
- 23 May 2018
This work proposes tethered balloon technology to provide efficient emergency communication services and reduce casualty mortality and morbidity for disaster recovery and reports that the performance of rescue and relief teams significantly improved.