Threat analysis for space information network based on network security attributes: a review

X Wu, Y Du, T Fan, J Guo, J Ren, R Wu… - Complex & Intelligent …, 2023 - Springer
Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to
the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much …

A survey on secure routing protocols for satellite network

Y Yan, G Han, H Xu - Journal of Network and Computer Applications, 2019 - Elsevier
Recently, many satellites have been launched for providing global internet broadband
service to individual consumers. As satellite networks become wide-spread, security issues …

Research on trust sensing based secure routing mechanism for wireless sensor network

D Qin, S Yang, S Jia, Y Zhang, J Ma, Q Ding - IEEE Access, 2017 - ieeexplore.ieee.org
Aiming at the serious impact of the typical network attacks caused by the limited energy and
the poor deployment environment of wireless sensor network (WSN) on data transmission, a …

[PDF][PDF] Black Hole along with Other Attacks in MANETs: A Survey.

FH Tseng, HP Chiang… - Journal of …, 2018 - s3.ap-northeast-2.amazonaws.com
Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had
accomplished a survey of black hole attacks in MANETs. However network technology is …

ISDSR+: improving the security and availability of secure routing protocol

H Kojima, N Yanai, JP Cruz - IEEE Access, 2019 - ieeexplore.ieee.org
In ad hoc networks that allow devices to dynamically configure networks via wireless
communication, a secure routing protocol is a technology that guarantees the validity of …

Organized topology based routing protocol in incompletely predictable ad-hoc networks

J Shen, C Wang, A Wang, X Sun, S Moh… - Computer …, 2017 - Elsevier
Nowadays, ad-hoc networks are becoming increasingly popular and has been put into
practice in many kinds of applications. However, in some environments, such as ground …

Secure routing and data transmission in mobile ad hoc networks

WS Alnumay, U Ghosh - arXiv preprint arXiv:1402.2108, 2014 - arxiv.org
In this paper, we present an identity (ID) based protocol that secures AODV and TCP so that
it can be used in dynamic and attack prone environments of mobile ad hoc networks. The …

ISDSR: Secure DSR with ID-based sequential aggregate signature

K Muranaka, N Yanai, S Okamura… - … Conference on Security …, 2016 - scitepress.org
Wireless sensor networks are often more vulnerable than wired ones. Especially, an
adversary can attack the networks by utilizing false route information. A countermeasure …

Optimization of CSMA (Carrier Sense Multiple Access) over AODV, DSR & WRP routing protocol

D Srivastava, V Sharma, D Soni - 2019 4th international …, 2019 - ieeexplore.ieee.org
Mobile adhoc network (MANET) is a infrastructure less wireless network which do not have
central control, and where each mobile node behave as either sender or receiver. The …

A communication-efficient secure routing protocol for iot networks

Y Shibasaki, K Iwamura, K Sato - Sensors, 2022 - mdpi.com
This paper proposes a secure routing protocol based on an ad hoc on-demand distance
vector to simultaneously achieve communication efficiency and security. Many studies have …