Impact of secrecy on capacity in large-scale wireless networks

J Zhang, L Fu, X Wang - 2012 Proceedings IEEE INFOCOM, 2012 - ieeexplore.ieee.org
Since wireless channel is vulnerable to eavesdroppers, the secrecy during message
delivery is a major concern in many applications such as commercial, governmental and …

[PDF][PDF] Intrusion detection for black hole and gray hole in MANETs

C She, P Yi, J Wang, H Yang - KSII Transactions on Internet and …, 2013 - koreascience.kr
Black and gray hole attack is one kind of routing disturbing attacks and can bring great
damage to the network. As a result, an efficient algorithm to detect black and gray attack is …

Secure interoperable architecture construction for overlay networks

P Jyothirmai, JS Raj - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks
to address the technical issues in heterogeneous networks that may lack continuous …

Security aware routing protocol for hybrid wireless network (SARP-HWNs) via trust enhanced mechanism

AV Kumar, SK Mohideen - International Journal of Business Data …, 2019 - igi-global.com
A hybrid wireless network handles both ad hoc networks and infrastructure networks, these
networks are affected by malicious attacks which affect the routing by packet drops …

Mobile Adhoc Networks Security Challenges: A Survey

S Kausar Fatima, S Gauhar Fatima… - … Journal of Advanced …, 2019 - papers.ssrn.com
MANET is a kind of Adhoc network with mobile, and wireless nodes. Because of its distinct
features like dynamic topology, hop-by-hop communications and easy and quick setup …

Rejoinder: The Emerging Role of Data Science in Cybersecurity

A Hero, S Kar, J Moura, J Neil, HV Poor, M Turcotte… - 2023 - hdsr.mitpress.mit.edu
We thank the discussants for their perspectives on our presentation (Hero et al., 2023) of
emerging challenges in cybersecurity and the role of data science in addressing these …

A Statistical-Physics Approach to the Analysisof Wireless Communication Systems

M Girnyk - 2014 - diva-portal.org
MULTIPLE antennas at each side of the communication channel seem to be vital for future
wireless communication systems. Multi-antenna communication provides throughput gains …

Delay and physical layer security tradeoff in large wireless networks

Y Zhong, T Han, Q Li, X Ge - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Exchange of crucial and confidential information in wireless networks leads to the
unprecedented attention on the security problem. Though a number of works have studied …

Secrecy transmission capacity in mobile ad hoc networks with security‐aware Aloha protocol

X Li, Y Zhang, Y Shen, X Jiang - IET Communications, 2020 - Wiley Online Library
Mobile ad hoc networks (MANETs) represent a class of important network models for
supporting various critical applications, while the security breach due to eavesdropping …

[PDF][PDF] Attacks prevention and detection techniques in MANET: a survey

PD Nikam, V Raut - J Eng Res Appl, 2014 - academia.edu
Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed
in geographical area to capture climatic changes like temperature, humidity and pressure. In …