Key management for beyond 5G mobile small cells: A survey

M De Ree, G Mantas, A Radwan, S Mumtaz… - IEEE …, 2019 - ieeexplore.ieee.org
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …

Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET

A Hammamouche, M Omar, N Djebari, A Tari - Journal of information …, 2018 - Elsevier
Ad hoc network is a set of mobile nodes interconnected by wireless communication. It is
easily and less expensive to deploy, but it is vulnerable against various attacks. The node …

Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment

D Korać, D Simić - Computers & Security, 2019 - Elsevier
The trend of rapid evolutionary development of mobile technologies and the existence of
different user's priorities are creating new challenges with regard to selection of multifactor …

Prediction of availability and integrity of cloud data using soft computing technique.

R Pitchai, S Babu, P Supraja… - Soft Computing-A …, 2019 - search.ebscohost.com
In cloud computing, data storage is the most important task. In cloud storage, security and
privacy are the major issues. To avoid such issues, we proposed a new protocol called …

[PDF][PDF] 基于身份密码的机载自组织网络动态密钥管理

王宏, 李建华, 赖成喆 - 电子与信息学报, 2018 - edit.jeit.ac.cn
针对现有机载自组织网络密钥管理存在的预分配密钥更新困难, 公钥证书传递开销大,
分布式身份密钥传递需要安全信道的问题, 该文提出一种无需安全信道的基于身份密码体制的 …

Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority

K Hamouid, K Adi - Peer-to-Peer Networking and Applications, 2019 - Springer
This paper proposes a compromise-tolerant (t, n)-threshold certification management
scheme for MANETs. Our solution allows to mitigate the impact of compromised nodes that …

Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks

VS Janani, MSK Manikandan - Sādhanā, 2016 - Springer
The wireless and dynamic nature of mobile ad hoc networks (MANET) render them more
vulnerable to security attacks. However, providing a security mechanism implicitly has been …

HiMAC: Hierarchical Message Authentication Code for Secure Data Dissemination in Mobile Ad Hoc Networks

K Mershad, A Hamie, M Hamze - 2017 - laur.lau.edu.lb
Mobile ad-hoc networks are wireless self-organized networks in which mobile nodes can
connect directly to each other. This fact makes such networks highly susceptible to security …

Identity Based Dynamic Key Management of Airborne Ad Hoc Network

H Wang, J Li, C Lai - 电子与信息学报, 2018 - jeit.ac.cn
Because of nowadays airborne network's updating difficulty of pre-allocated symmetrical
key, high communication cost of public key certificate and the requirement of security …

Efficient approaches to mitigate the effect of Sybil attack in manet for high network lifetime: A review

R Kumari, M Dutta - 2018 Fifth International Conference on …, 2018 - ieeexplore.ieee.org
MANET is known as a self configuring, dynamic infrastructure to connect mobile devices
through wireless. There are several challenges which affect the MANET, such as routing …