Routing security in wireless ad hoc networks - Deng, Li, et al. - 2002 () Citation Context ...packet forward or Topology discovery as described below. Other researches attempted to provide routing layer solutions to black hole attacks, with techniques to identify and isolate these nodes as in...
Giruka, V.C., Singhal, M. (2007). Secure Routing in Wireless Ad-Hoc Networks. In: Xiao, Y., Shen, X.S., Du, DZ. (eds) Wireless Network Security. Signals and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-33112-6_6 Download citation .RIS .EN...
Wireless ad hoc networks are an open environment and it is susceptible to many security attacks due to the inherent features. Attacks in the wireless ad hoc environments are classified under two categories; active and passive attacks. Passive attacker eavesdrop the information transmitted through the ...
securityAn ad hoc wireless network is a collection of wireless mobile nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Due to the absence of...
Liu, ZhenLi Xue-fei,Laurie Cuthbert.On-demand Node-Disjoint Multipath.Routing in wireless Ad hoc networks[C].Proceedings of IEEE Local Computer Networks (LCN),November 2004:19-20.US7808939 * Mar 28, 2003 Oct 5, 2010 Lenovo (Singapore) Pte Ltd. Routing in wireless ad-hoc networks...
In this section, we exemplify the need for security awareness in an ad hoc network at the routing level with a battle?eld communication scenario. I. I NTRODUCTION Wireless ad hoc networks have been proposed to support dynamic scenarios where no wired infrastructure exists. Most ad hoc routing ...
Zapata MG, Asokan N (2002) Securing ad hoc routing protocols. In: Proceedings of ACM Workshop on Wireless Security (WiSe) Zhang Y, Lazos L, Kozma W (2016) AMD: audit-based misbehavior detection in wireless ad hoc networks. IEEE Trans Mob Comput 15(8):1893–1907 ...
Real Time Two Hop Neighbour Strategic Secure Routing with Attribute Specific Blockchain Encryption Scheme for Improved Security in Wireless Sensor Networks Wireless Sensor Network (WSN) is most vulnerable to routing a...
Hence, the network's wireless topology may change rapidly and unpredictably. Such a network may operate in a stand-alone fashion or may be connected to a larger Internet. Sensor networks consisting of sensing, data processing, and communication components are examples of adhoc networks. Due to ...
Designing secure wireless mobile ad hoc networks In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future commun... V Balakrishnan,V Varadharajan - IEEE 被引量: 29发表: 2005年 Anonymous authentication and...