Friendly ad hoc routing in cloud scenario using CH selection and transmission head to enrich the security mechanism.
Parthasarathy RamadassShanmugapriyan JPublished in: J. Ambient Intell. Humaniz. Comput. (2021)
Keyphrases
- security mechanisms
- resource constrained
- security issues
- security systems
- cloud computing
- smart card
- routing protocol
- operating system
- access control
- security protocols
- security requirements
- transmission delay
- real time
- data transmission
- computer networks
- routing algorithm
- ad hoc networks
- data center
- computer systems
- data mining
- databases