Understanding security requirements and challenges in Internet of Things (IoT): A review

S Hameed, FI Khan, B Hameed - Journal of Computer Networks …, 2019 - Wiley Online Library
Internet of things (IoT) is realized by the idea of free flow of information amongst various low‐
power embedded devices that use the Internet to communicate with one another. It is …

Mobile ad hoc networks: current status and future trends

J Loo, J Lloret Mauri, J Hamilton Ortiz - 2011 - library.oapen.org
Guiding readers through the basics of these rapidly emerging networks to more advanced
concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future …

SGHRP: Secure Greedy Highway Routing Protocol with authentication and increased privacy in vehicular ad hoc networks

E Khezri, E Zeinali, H Sargolzaey - Plos one, 2023 - journals.plos.org
VANETs are networks of connected intelligent vehicles that can communicate with each
other, as well as with infrastructure and fixed roadside equipment. As a result of the lack of …

Wireless mesh networks: a survey

IF Akyildiz, X Wang, W Wang - Computer networks, 2005 - Elsevier
Wireless mesh networks (WMNs) consist of mesh routers and mesh clients, where mesh
routers have minimal mobility and form the backbone of WMNs. They provide network …

[图书][B] Wireless sensor networks

IF Akyildiz, MC Vuran - 2010 - books.google.com
This book presents an in-depth study on the recent advances in Wireless Sensor Networks
(WSNs). The authors describe the existing WSN applications and discuss the research …

Ariadne: A secure on-demand routing protocol for ad hoc networks

YC Hu, A Perrig, DB Johnson - Proceedings of the 8th annual …, 2002 - dl.acm.org
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Page 1 Ariadne: A
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …

Mobile ad hoc networking: imperatives and challenges

I Chlamtac, M Conti, JJN Liu - Ad hoc networks, 2003 - Elsevier
Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise
wireless mobile nodes that can freely and dynamically self-organize into arbitrary and …

EAACK—a secure intrusion-detection system for MANETs

EM Shakshuki, N Kang… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The migration to wireless network from wired network has been a global trend in the past
few decades. The mobility and scalability brought by wireless network made it possible in …

Secure link state routing for mobile ad hoc networks

P Papadimitratos, ZJ Haas - 2003 Symposium on Applications …, 2003 - ieeexplore.ieee.org
Secure operation of the routing protocol is one of the major challenges to be met for the
proliferation of the mobile ad hoc networking (MANET) paradigm. Nevertheless, security …

Security in mobile ad hoc networks: challenges and solutions

H Yang, H Luo, F Ye, S Lu… - IEEE wireless …, 2004 - ieeexplore.ieee.org
Security has become a primary concern in order to provide protected communication
between mobile nodes in a hostile environment. Unlike the wireline networks, the unique …