Security in wireless ad-hoc networks–a survey

R Di Pietro, S Guarino, NV Verde… - Computer …, 2014 - Elsevier
Pervasive mobile and low-end wireless technologies, such as radio-frequency identification
(RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs) …

Security issues in mobile ad hoc network

N Islam, ZA Shaikh - Wireless Networks and Security: Issues, Challenges …, 2013 - Springer
Abstract Mobile Ad hoc Networks (MANET) are infrastructure-less networks characterized by
lack of prior configuration and the hostile environments. Their unique properties make them …

Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET

A Hammamouche, M Omar, N Djebari, A Tari - Journal of information …, 2018 - Elsevier
Ad hoc network is a set of mobile nodes interconnected by wireless communication. It is
easily and less expensive to deploy, but it is vulnerable against various attacks. The node …

[PDF][PDF] An enhanced distributed certificate authority scheme for authentication in mobile ad hoc networks

S Palaniswami, A Rajaram - The International Arab Journal of Information …, 2012 - ccis2k.org
In Mobile Ad hoc Networks (MANETs), it is easy to launch wormhole, man-in-the-middle and
Denial Of Service (DoS) attacks, or to impersonate another node. Our previous work …

Security issues in the optimized link state routing protocol version 2 (OLSRv2)

U Herberg, T Clausen - arXiv preprint arXiv:1005.4505, 2010 - arxiv.org
Mobile Ad hoc NETworks (MANETs) are leaving the confines of research laboratories, to find
place in real-world deployments. Outside specialized domains (military, vehicular, etc.), city …

A high certificate authority scheme for authentication in mobile ad hoc networks

A Rajaram, S Palaniswami - International Journal of Computer …, 2010 - search.proquest.com
In mobile ad hoc networks (MANETs), it is easy to launch wormhole, man-in-the-middle and
denial of service (DoS) attacks, or to impersonate another node. Trust based cross layer …

ETUS: enhanced triple umpiring system for security and robustness of wireless mobile ad hoc networks

A Kathirvel, R Srinivasan - International Journal of …, 2011 - inderscienceonline.com
Ad hoc wireless networks provide mobile communication capability to satisfy a need of a
temporary nature and without the existence of any well-defined infrastructure. Protecting the …

[图书][B] The Future of Wireless Networks: Architectures, Protocols, and Services

M Guizani, HH Chen, C Wang - 2015 - books.google.com
The exponential increase in mobile device users and high-bandwidth applications has
pushed the current wireless networks to their capacity. To handle this spectacular growth …

Enhancing security of cookie-based sessions in mobile networks using sparse caching

A Alabrah, J Cashion, M Bassiouni - International journal of information …, 2014 - Springer
The exponential growth in the use of mobile phones and tablets to gain wireless access to
the Internet has been accompanied by a similar growth in cyber attacks over wireless links to …

[图书][B] Redeemable reputation based secure routing protocol for wireless sensor networks

Y Chae - 2012 - search.proquest.com
Abstract Wireless Sensor Networks (WSNs) can be used for various applications, such as
military, environmental, health, home, and other commercial applications. Since thousands …