[PDF][PDF] Probabilistic Framework for Assessing the Threat Level using Novel Decision Constructs in Mobile Adhoc Network.

V Sangeetha, SS Kumar - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
The existing secure routing protocol in Mobile Adhoc Network (MANET) lacks the capability
of identifying the dubious communication behavior of a mobile node, which is essential in …

Elliptic Curve Cryptography For EAACK Intrusion Detection System

T Save, R Chhatani - Proceedings of the Sixth International Conference …, 2015 - dl.acm.org
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the
dynamic nature of its network infrastructure. Among the various attacks, routing attacks do …

Design of Finite Length Interleaved Coding Schemes for Secrecy

DCLS Pereira - 2015 - search.proquest.com
With the increasing use of wireless communications, came a growing concern for obtaining
confidentiality in the transmission of data. Recently, methods for applying secrecy at the …

[PDF][PDF] Performance of physical layer security under correlated fading wire-tap channel

J Zhu - 2014 - fun.repo.nii.ac.jp
The inherent openness of wireless medium makes information security one of the most
important and difficult problems in wireless networks. Physical layer security, which achieves …

On Eavesdropper-Tolerance Capability of Two-Hop Wireless Networks

Y Zhang, Y Shen, H Wang, X Jiang - arXiv preprint arXiv:1312.3748, 2013 - arxiv.org
Two-hop wireless network serves as the basic net-work model for the study of general
wireless networks, while cooperative jamming is a promising scheme to achieve the physi …

Enhancing Physical-Layer Secrecy in Modern Wireless Communication Systems

YWP Hong, PC Lan, CCJ Kuo, YWP Hong… - … Approaches to Secure …, 2014 - Springer
This chapter provides a brief survey of recent developments and applications of physical-
layer secrecy techniques in modern wireless systems, such as cognitive radios, orthogonal …

[引用][C] HYBRID ANONYMOUS LOCATION-AIDED ROUTING PROTOCOL FOR PRIVACY PRESERVING AND AUTHENTICATION IN MANET.

YVS SAI PRAGATHI, SP Setty - Journal of Theoretical & Applied Information …, 2013

[引用][C] Energy Efficient Routing in Random Deployment of Wireless Sensor Networks

R Kandpal, R Singh, HL Mandoria - International Journal of Emerging Research in …, 2015

[引用][C] SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS: A SURVEY