Security threats and solutions in MANETs: A case study using AODV and SAODV

J Von Mulert, I Welch, WKG Seah - Journal of network and computer …, 2012 - Elsevier
Mobile ad hoc network (MANET) security has become the focus of prolific research efforts.
Driven by the unique and considerable difficulties of providing security arising from the …

Secure ad hoc on-demand distance vector routing

MG Zapata - ACM SIGMOBILE Mobile Computing and …, 2002 - dl.acm.org
This article gives an overview of different approaches to provide security features to routing
protocols in mobile ad hoc networks (MANET). It also describes Secure AODV (an extension …

TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing

W Fang, W Zhang, W Chen, Y Liu, C Tang - wireless networks, 2020 - Springer
Based on fog computer, an industrial wireless sensor network (F-IWSN) is a novel wireless
sensor network in the industry. It not only can more efficiently reduce information …

Attacks and countermeasures in the internet of vehicles

Y Sun, L Wu, S Wu, S Li, T Zhang, L Zhang, J Xu… - Annals of …, 2017 - Springer
As a typical application of Internet of Things (IoT) in the field of transportation, Internet of
Vehicles (IoV) aims at achieving an integrated intelligent transportation system to enhance …

Security and Privacy in the Internet of Vehicles

Y Sun, L Wu, S Wu, S Li, T Zhang… - … , and knowledge in …, 2015 - ieeexplore.ieee.org
Internet of Vehicles (IoV) is a typical application of Internet of things in the field of
transportation, which aims at achieving an integrated intelligent transportation system to …

Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks

R Lacuesta, J Lloret, M Garcia, L Peñalver - Journal of Network and …, 2011 - Elsevier
We can find many cases where a spontaneous wireless ad-hoc network must be built for a
limited period of time in a wireless mesh network: meetings, conferences, etc. One of the …

Resource-aware self-adaptive security provisioning in mobile ad hoc networks

C Chigan, L Li, Y Ye - IEEE Wireless Communications and …, 2005 - ieeexplore.ieee.org
Providing satisfactory security services in mobile ad hoc networks (MANET) is indispensable
for mission critical applications; however, often a highly secure mechanism inevitably …

A network layer covert channel in ad-hoc wireless networks

S Li, A Epliremides - … Society Conference on Sensor and Ad …, 2004 - ieeexplore.ieee.org
Covert channels violate both secrecy and integrity properties of trusted systems. This paper
investigates ad-hoc wireless networks' susceptibility to covert channels through …

Sensors for detection of misbehaving nodes in MANETs

F Kargl, S Schlott, M Weber - 2005 - degruyter.com
The fact that security is a critical problem when implementing mobile ad hoc networks
(MANETs) is widely acknowledged. One of the different kinds of misbehaviour a node may …

Covert channels in ad-hoc wireless networks

S Li, A Ephremides - Ad Hoc Networks, 2010 - Elsevier
A covert channel is a concealed communication path embedded in an overt one. Existence
of covert channels violates both secrecy and integrity properties of trusted systems. While …