Security threats and solutions in MANETs: A case study using AODV and SAODV
Mobile ad hoc network (MANET) security has become the focus of prolific research efforts.
Driven by the unique and considerable difficulties of providing security arising from the …
Driven by the unique and considerable difficulties of providing security arising from the …
Secure ad hoc on-demand distance vector routing
MG Zapata - ACM SIGMOBILE Mobile Computing and …, 2002 - dl.acm.org
This article gives an overview of different approaches to provide security features to routing
protocols in mobile ad hoc networks (MANET). It also describes Secure AODV (an extension …
protocols in mobile ad hoc networks (MANET). It also describes Secure AODV (an extension …
TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing
Based on fog computer, an industrial wireless sensor network (F-IWSN) is a novel wireless
sensor network in the industry. It not only can more efficiently reduce information …
sensor network in the industry. It not only can more efficiently reduce information …
Attacks and countermeasures in the internet of vehicles
Y Sun, L Wu, S Wu, S Li, T Zhang, L Zhang, J Xu… - Annals of …, 2017 - Springer
As a typical application of Internet of Things (IoT) in the field of transportation, Internet of
Vehicles (IoV) aims at achieving an integrated intelligent transportation system to enhance …
Vehicles (IoV) aims at achieving an integrated intelligent transportation system to enhance …
Security and Privacy in the Internet of Vehicles
Y Sun, L Wu, S Wu, S Li, T Zhang… - … , and knowledge in …, 2015 - ieeexplore.ieee.org
Internet of Vehicles (IoV) is a typical application of Internet of things in the field of
transportation, which aims at achieving an integrated intelligent transportation system to …
transportation, which aims at achieving an integrated intelligent transportation system to …
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
We can find many cases where a spontaneous wireless ad-hoc network must be built for a
limited period of time in a wireless mesh network: meetings, conferences, etc. One of the …
limited period of time in a wireless mesh network: meetings, conferences, etc. One of the …
Resource-aware self-adaptive security provisioning in mobile ad hoc networks
C Chigan, L Li, Y Ye - IEEE Wireless Communications and …, 2005 - ieeexplore.ieee.org
Providing satisfactory security services in mobile ad hoc networks (MANET) is indispensable
for mission critical applications; however, often a highly secure mechanism inevitably …
for mission critical applications; however, often a highly secure mechanism inevitably …
A network layer covert channel in ad-hoc wireless networks
S Li, A Epliremides - … Society Conference on Sensor and Ad …, 2004 - ieeexplore.ieee.org
Covert channels violate both secrecy and integrity properties of trusted systems. This paper
investigates ad-hoc wireless networks' susceptibility to covert channels through …
investigates ad-hoc wireless networks' susceptibility to covert channels through …
Sensors for detection of misbehaving nodes in MANETs
The fact that security is a critical problem when implementing mobile ad hoc networks
(MANETs) is widely acknowledged. One of the different kinds of misbehaviour a node may …
(MANETs) is widely acknowledged. One of the different kinds of misbehaviour a node may …
Covert channels in ad-hoc wireless networks
S Li, A Ephremides - Ad Hoc Networks, 2010 - Elsevier
A covert channel is a concealed communication path embedded in an overt one. Existence
of covert channels violates both secrecy and integrity properties of trusted systems. While …
of covert channels violates both secrecy and integrity properties of trusted systems. While …