Modelling and verifying the AODV routing protocol

R van Glabbeek, P Höfner, M Portmann, WL Tan - Distributed Computing, 2016 - Springer
This paper presents a formal specification of the Ad hoc On-demand Distance Vector
(AODV) routing protocol using AWN (Algebra for Wireless Networks), a recent process …

The case for software-defined networking in heterogeneous networked environments

M Mendonca, K Obraczka, T Turletti - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Motivated by a vision of a fully connected world, we explore how Software-Defined
Networking (SDN) can be utilized to support heterogeneous environments consisting of both …

STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based MANET

MBM Kamel, I Alameri… - 2017 IEEE 2nd Advanced …, 2017 - ieeexplore.ieee.org
Mobile ad hoc networks (MANET) is a type of networks that consists of autonomous nodes
connecting directly without a top-down network architecture or central controller. Absence of …

Security threats in mobile ad hoc networks

S Sen, JA Clark, JE Tapiador - Security of Self-Organizing …, 2010 - api.taylorfrancis.com
With the proliferation of cheaper, smaller, and more powerful mobile devices, mobile ad hoc
networks (MANETs) have become one of the fastest growing areas of research. This new …

[PDF][PDF] A comparative study of various security approaches used in wireless sensor networks

K Sharma, MK Ghose, D Kumar… - … journal of advanced …, 2010 - researchgate.net
The security in wireless sensor networks (WSNs) is a critical issue due to the inherent
limitations of computational capacity and power usage. While a variety of security …

Anti-jamming strategy versus a low-power jamming attack when intelligence of adversary's attack type is unknown

A Garnaev, Y Liu, W Trappe - IEEE Transactions on Signal and …, 2015 - ieeexplore.ieee.org
In this paper, we suggest a new class of anti-jamming problems where the type of
intelligence associated with ajamming attack is unknown. Specifically, we consider a …

Establishing secure routing path using trust to enhance security in MANET

VV Sarbhukan, L Ragha - Wireless Personal Communications, 2020 - Springer
Because of versatility and portability brought by remote system made it conceivable in
numerous applications. Among all the contemporary remote systems, mobile ad hoc network …

Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network

MJ Faghihniya, SM Hosseini, M Tahmasebi - Wireless Networks, 2017 - Springer
VANET is an ad hoc network that formed between vehicles. Security in VANET plays vital
role. AODV routing protocol is a reactive or on-demand routing protocol which means if there …

Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis

MA Gorlatova, PC Mason, M Wang… - MILCOM 2006-2006 …, 2006 - ieeexplore.ieee.org
We have implemented a fully-functional wormhole attack in an IPv6 802.11 b wireless
mobile ad hoc network (MANET) test bed running a proactive routing protocol. Using …

Survey on cooperative medium access control protocols

P Ju, W Song, D Zhou - Iet Communications, 2013 - Wiley Online Library
In the past decade, there has been ever‐increasing research attention to user cooperation in
the wireless communication networks. The unique challenges of wireless networks such as …