[PDF][PDF] Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks

OF Gonzalez Duque, G Ansa, M Howarth… - Journal of Internet …, 2008 - researchgate.net
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation
compromised by a variety of security attacks. For example, misbehaving nodes can cause …

Detection of packet forwarding misbehavior in mobile ad-hoc networks

OF Gonzalez, M Howarth, G Pavlou - … 2007, Coimbra, Portugal, May 23-25 …, 2007 - Springer
Abstract Mobile Ad Hoc networks (MANETs) are susceptible to having their effective
operation compromised by a variety of security attacks. Nodes may misbehave either …

An improved DSDV routing protocol for wireless ad hoc networks

GF Ahmed, R Barskar, N Barskar - Procedia Technology, 2012 - Elsevier
Abstract A Mobile Ad hoc NETwork (MANET) is a kind of wireless ad-hoc network and is a
self configuring network of mobile routers connected by wireless links. The wireless links …

Customization of register file banking architecture for low power

R Nalluri, R Garg, PR Panda - … on VLSI Design held jointly with …, 2007 - ieeexplore.ieee.org
Register file banking is an effective alternative to monolithic register files in embedded
processor based systems. In this work, we propose techniques for performing application …

Securely-entrusted multi-topology routing for community networks

A Neumann, E López, L Cerdà-Alabern… - 2016 12th Annual …, 2016 - ieeexplore.ieee.org
Routing in open and decentralized networks relies on cooperation despite the participation
of unknown nodes and node administrators pursuing heterogeneous trust and security …

A Secure and Stable Routing Protocol for VANET Under Malicious Attacks

AA Sabbagh, MV Shcherbakov - … , September 20–23, 2021, Proceedings 4, 2021 - Springer
Changing over digital age is becoming the driving force for modern approaches to provide a
safe road system. Vehicular ad hoc networks (VANETs) are new networks that are used in …

[PDF][PDF] A new combination approach to secure manets against attacks

GS Mamatha, DSC Sharma - International Journal of Wireless & Mobile …, 2010 - Citeseer
In Wireless communications the traffic across a mobile ad hoc network (MANET) can be
highly vulnerable to security threats. Because of the features like unreliability of wireless …

A black hole attack model using topology approximation for reactive ad–hoc routing protocols

CW Badenhop, BE Mullins - International Journal of …, 2014 - inderscienceonline.com
This paper examines one particular network degradation attack, the Black Hole attack, to
determine if an analytical model can be used to predict the impact of this attack on ad–hoc …

Secure M2M service space in residential home

J Latvakoski, T Hautakoski, T Väisänen… - Proceedings of the …, 2009 - dl.acm.org
The motivation for this research arises from the explosion in the numbers of embedded
devices in residential home environments, and their novel capabilities to connect with the …

The effect of secure routing with QoS amplification (SRQA) in wireless mesh networks

K Sundaramoorthy… - … Conference on Current …, 2014 - ieeexplore.ieee.org
The use of Wireless Mesh Networks has been increased to a great extent as it remains as a
reliability promising technology. Secure routing in Wireless Mess Networks (WMNs) is a …