Author of the publication

Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks.

, , , and . Security and Communication Networks, 7 (8): 1292-1309 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Superpeer Control Messages for P2P Virtual Network in MANET., , , and . ALPIT, page 466-470. IEEE Computer Society, (2008)Ordering of simultaneous events in distributed DEVS simulation., , , and . Simul. Pr. Theory, 5 (3): 253-268 (1997)Traffic-aware Cooperative Binary Exponential Backoff Algorithm for Low Power and Lossy Networks., , , , and . Wireless Personal Communications, 86 (4): 1913-1929 (2016)Remote Industrial Sensor Network Monitoring Using M2M Based Ethical Sniffers., , , , and . IJDSN, (2012)A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networks., , , and . IJDSN, (2018)WEAMR - A Weighted Energy Aware Multipath Reliable Routing Mechanism for Hotline-Based WSNs., , , , and . Sensors, 13 (5): 6295-6318 (2013)Multi-antenna channel capacity enhancement in wireless communication., , , and . ICUFN, page 77-82. IEEE, (2015)A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) Systems., , , , , and . IPCCC, page 289-296. IEEE Computer Society, (2008)CORBA-Based, Multi-threaded Distributed Simulation of Hierarchical DEVS Models: Transforming Model Structure into a Non-hierarchical One., and . ICCSA (4), volume 3046 of Lecture Notes in Computer Science, page 167-176. Springer, (2004)Cluster-based AAA architecture for wireless sensor and WiMax networks., , , and . ICUIMC, page 117:1-117:10. ACM, (2012)