{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T11:29:49Z","timestamp":1722943789234},"reference-count":23,"publisher":"Engineering and Technology Publishing","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["jcm"],"published-print":{"date-parts":[[2019]]},"DOI":"10.12720\/jcm.14.3.164-169","type":"journal-article","created":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T02:19:27Z","timestamp":1575944367000},"page":"164-169","source":"Crossref","is-referenced-by-count":0,"title":["Secure Neighbour Discovery: Secure k-Nearest ROUTING AD-HOC Networking Using Diffie-Helman and HIGHEST Connectivity Algorithm"],"prefix":"10.12720","author":[{"name":"Research Scholar, Department of Computer science Engineering, Karpagam Academy of Higher Education, Coimbatore, Tamil Nadu, India","sequence":"first","affiliation":[]},{"given":"Dhanabal","family":"S","sequence":"first","affiliation":[]},{"given":"Prasanna Venkatesan G. K.","family":"D","sequence":"additional","affiliation":[]},{"given":"Amudhavalli","family":"P","sequence":"additional","affiliation":[]}],"member":"4977","published-online":{"date-parts":[[2019]]},"reference":[{"key":"ref0","doi-asserted-by":"publisher","unstructured":"[1] L. Lazos and R. Poovendran, \"HiRLoc: High-Resolution robust localization for wireless sensor networks,\" IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 233-246, Feb. 2006.","DOI":"10.1109\/JSAC.2005.861381"},{"key":"ref1","doi-asserted-by":"publisher","unstructured":"[2] P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Capkun, and J. P. Hubaux, \"Secure neighborhood discovery: A fundamental element for mobile ad hoc networks,\" IEEE Comm. Magazine, vol. 46, no. 2, pp. 132-139, Feb. 2008.","DOI":"10.1109\/MCOM.2008.4473095"},{"key":"ref2","doi-asserted-by":"publisher","unstructured":"[3] R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos, and J. P. Hubaux, \"A practical secure neighbor verification protocol for wireless sensor networks,\" in Proc. Second ACM Conf. Wireless Network Security (WiSec), Mar. 2009.","DOI":"10.1145\/1514274.1514302"},{"key":"ref3","doi-asserted-by":"publisher","unstructured":"[4] M. Poturalksi, P. Papadimitratos, and J. P. Hubaux, \"Towards provable secure neighbor discovery in wireless networks,\" in Proc. Workshop Formal Methods in Security Eng., Oct. 2008.","DOI":"10.1145\/1456396.1456400"},{"key":"ref4","doi-asserted-by":"publisher","unstructured":"[5] S. Capkun and J. P. Hubaux, \"Secure positioning in wireless networks,\" IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 221-232, Feb. 2006.","DOI":"10.1109\/JSAC.2005.861380"},{"key":"ref5","doi-asserted-by":"publisher","unstructured":"[6] E. Ekici, S. Vural, J. McNair, and D. Al-Abri, \"Secure probabilistic location verification in randomly deployed wireless sensor networks,\" Elsevier Ad Hoc Networks, vol. 6, no. 2, pp. 195-209, 2008","DOI":"10.1016\/j.adhoc.2006.11.006"},{"key":"ref6","doi-asserted-by":"publisher","unstructured":"[7] P. Papadimitratos and Z. J. Haas, \"Secure routing for mobile ad hoc networks,\" in Proc. SCS Commun. Networks and Distrib. Sys. Modeling and Simulation Conf., 2002.","DOI":"10.1201\/9781420040401.ch31"},{"key":"ref7","doi-asserted-by":"publisher","unstructured":"[8] S. Capkun, L. Butty\u00e1n, and J. P. Hubaux, \"Sector: Secure tracking of node encounters in multihop wireless networks,\" in. ACM Wksp. Security of Ad Hoc and Sensor Networks, ACM Press, 2003, pp. 21-32.","DOI":"10.1145\/986858.986862"},{"key":"ref8","doi-asserted-by":"publisher","unstructured":"[9] D. Ciullo, V. Martina, M. Garetto, and E. Leonardi, \"Impact of correlated mobility on delay-throughput performance in mobile ad hoc networks,\" IEEE\/ACM Trans. Netw., vol. 19, no. 6, pp. 1745-1758, Dec. 2011.","DOI":"10.1109\/TNET.2011.2140128"},{"key":"ref9","doi-asserted-by":"publisher","unstructured":"[10] M. J. Neely and E. Modiano, \"Capacity and delay tradeoffs for ad hoc mobile networks,\" IEEE Trans. Inf. Theory, vol. 51, no. 6, pp. 1917-1937, Jun. 2005.","DOI":"10.1109\/TIT.2005.847717"},{"key":"ref10","doi-asserted-by":"publisher","unstructured":"[11] M. Garetto and E. Leonardi, \"Restricted mobility improves delaythroughput tradeoffs in mobile ad hoc networks,\" IEEE Trans. Inf. Theory, vol. 56, no. 10, pp. 5016-5029, Oct. 2010.","DOI":"10.1109\/TIT.2010.2059510"},{"key":"ref11","unstructured":"[12] S. Capkun, M. Hamdi, and J. Hubaux, \"GPS-free positioning in mobile ad-hoc networks,\" in Proc. HICCSS, Maui, Hawaii, Jan. 2001, pp. 3481-3490."},{"key":"ref12","doi-asserted-by":"publisher","unstructured":"[13] G. 'Acs, L. Butty'an, and I. Vajda, \"Provably secure on- demand source routing in mobile ad hoc networks,\" IEEE Transactions on Mobile Computing, vol. 5, no. 11, pp. 1533-1546, 2006.","DOI":"10.1109\/TMC.2006.170"},{"key":"ref13","doi-asserted-by":"publisher","unstructured":"[14] M. Grossglauser and D. N. C. Tse, \"Mobility increases the capacity of ad hoc wireless networks,\" IEEE\/ACM Trans. Netw., vol. 10, no. 4, pp. 477-486, Aug. 2002.","DOI":"10.1109\/TNET.2002.801403"},{"key":"ref14","doi-asserted-by":"publisher","unstructured":"[15] D. Ciullo, V. Martina, M. Garetto, and E. Leonardi, \"Impact of correlated mobility on delay-throughput performance in mobile ad hoc networks,\" IEEE\/ACM Trans. Netw., vol. 19, no. 6, pp. 1745-1758, Dec. 2011.","DOI":"10.1109\/TNET.2011.2140128"},{"key":"ref15","doi-asserted-by":"publisher","unstructured":"[16] L. Ying, S. Yang, and R. Srikant, \"Optimal delay- throughput trade-offs in mobile ad hoc networks,\" IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4119-4143, Sep. 2008.","DOI":"10.1109\/TIT.2008.928247"},{"key":"ref16","unstructured":"[17] X. Lin and N. B. Shroff, \"The fundamental capacity-delay tradeoff in large mobile ad hoc networks,\" in Proc. MedHoc'04, 2004."},{"key":"ref17","doi-asserted-by":"publisher","unstructured":"[18] G. Sharma, R. R. Mazumdar, and N. B. Shroff, \"Delay and capacity trade-offs in mobile ad hoc networks: A global perspective,\" in Proc. IEEE INFOCOM '06, 2006.","DOI":"10.1109\/INFOCOM.2006.144"},{"key":"ref18","doi-asserted-by":"publisher","unstructured":"[19] X. Hong, M. Gerla, G. Pei, and C. Chiang, \"A group mobility model for ad hoc wireless networks,\" in Proc. ACM MSWiM '99, 1999.","DOI":"10.1145\/313237.313248"},{"key":"ref19","doi-asserted-by":"publisher","unstructured":"[20] A. Savvides, C. Han, and M. Srivastava, \"Dynamic fine-grained localization in ad-hoc networks of sensors,\" in Proc. MOBICOM, Rome, Italy, Jul. 2001, pp. 166-179.","DOI":"10.1145\/381677.381693"},{"key":"ref20","unstructured":"[21] S. Chinara and S. K. Rath, \"TACA: A topology adaptive clustering algorithm for mobile ad hoc network,\" in National Institute of Technology, Rourkela, Orissa, India, January 2009"},{"key":"ref21","doi-asserted-by":"publisher","unstructured":"[22] M. Kumaresan and G. K. D. P. Venkatesan, \"Enabling high performance computing in cloud computing environments,\" in IEEE Xplore, ICEICEECE-2017.","DOI":"10.1109\/ICEICE.2017.8191887"},{"key":"ref22","doi-asserted-by":"publisher","unstructured":"[23] K. K. Sampth and V. G. K. D. Prasanna \"Certain investigation in DNS stub network performance by using accelerator system,\" Asian Journal of Research in Social Sciences and Sciences and Humanities, vol. 7, no. 2, 2017.","DOI":"10.5958\/2249-7315.2017.00072.7"}],"container-title":["Journal of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.jocm.us\/uploadfile\/2019\/0225\/20190225113040786.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T01:20:46Z","timestamp":1609291246000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/index.php?m=content&c=index&a=show&catid=218&id=1327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":23,"URL":"https:\/\/doi.org\/10.12720\/jcm.14.3.164-169","relation":{},"ISSN":["2374-4367"],"issn-type":[{"type":"print","value":"2374-4367"}],"subject":[],"published":{"date-parts":[[2019]]}}}