Key management for beyond 5G mobile small cells: A survey

M De Ree, G Mantas, A Radwan, S Mumtaz… - IEEE …, 2019 - ieeexplore.ieee.org
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …

Securing mobile ad hoc networks with certificateless public keys

Y Zhang, W Liu, W Lou, Y Fang - IEEE transactions on …, 2006 - ieeexplore.ieee.org
This paper studies key management, a fundamental problem in securing mobile ad hoc
networks (MANETs). We present IKM, an ID-based key management scheme as a novel …

Authentication protocols for ad hoc networks: taxonomy and research issues

N Aboudagga, MT Refaei, M Eltoweissy… - Proceedings of the 1st …, 2005 - dl.acm.org
Ad hoc networks, such as sensor and mobile ad hoc networks, must overcome a myriad of
security challenges to realize their potential in both civil and military applications. Typically …

Mechanism design-based secure leader election model for intrusion detection in MANET

N Mohammed, H Otrok, L Wang… - IEEE transactions on …, 2009 - ieeexplore.ieee.org
In this paper, we study leader election in the presence of selfish nodes for intrusion detection
in mobile ad hoc networks (MANETs). To balance the resource consumption among all …

A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks

H Nakayama, S Kurosawa, A Jamalipour… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETs) are usually formed without any major infrastructure. As a
result, they are relatively vulnerable to malicious network attacks, and therefore, security is a …

Quantifying trust in mobile ad-hoc networks

M Virendra, M Jadliwala… - … on Integration of …, 2005 - ieeexplore.ieee.org
This paper introduces a trust-domain based security architecture for mobile ad-hoc networks
(MANETs). The aim of this architecture is twofold: to use trust as a basis to establish keys …

Privacy and quality preserving multimedia data aggregation for participatory sensing systems

F Qiu, F Wu, G Chen - IEEE Transactions on Mobile Computing, 2014 - ieeexplore.ieee.org
With the popularity of mobile wireless devices equipped with various kinds of sensing
abilities, a new service paradigm named participatory sensing has emerged to provide users …

System and methods for providing network quarantine

ED Lewis, H Berk, NC Gidwani, JM Johansson… - US Patent …, 2009 - Google Patents
A client quarantine agent requests bill of health from a quarantine server, and receives a
manifest of checks that the client computer must perform. The quarantine agent then sends a …

Cooperative unmanned autonomous vehicle control for spatially secure group communications

SW Kim, SW Seo - IEEE Journal on selected areas in …, 2012 - ieeexplore.ieee.org
Beyond the individual independent unmanned autonomous vehicle (UAV), cooperative
control of multiple UAVs has started to receive significant attention from industry, academia …

A cluster-based architecture to structure the topology of parallel wireless sensor networks

J Lloret, M Garcia, D Bri, JR Diaz - Sensors, 2009 - mdpi.com
A wireless sensor network is a self-configuring network of mobile nodes connected by
wireless links where the nodes have limited capacity and energy. In many cases, the …