[PDF][PDF] Security Aspects in Mobile Ad Hoc Network(MANETs): Technical Review

M Kumar, R Rishi - International Journal of Computer Applications, 2010 - researchgate.net
ABSTRACT Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network,
offering unrestricted mobility without any underlying infrastructure such as base station or …

Enhancing the security of local dangerwarnings in vanets-a simulative analysis of voting schemes

B Ostermaier, F Dotzer… - The Second International …, 2007 - ieeexplore.ieee.org
The upcoming deployment of vehicular ad-hoc networks does not only facilitate novel
telematics applications, but also poses strong requirements on security. Especially the …

Preventing replay attacks for secure routing in ad hoc networks

J Zhen, S Srinivas - International Conference on Ad-Hoc Networks and …, 2003 - Springer
The design of secure routing techniques is a crucial and challenging requirement in mobile
ad hoc networking. This is due to the fact that the highly dynamic nature of the ad hoc nodes …

无线传感器网络基于节点行为的信誉评测模型

杨光, 印桂生, 杨武, 耿贵宁 - 通信学报, 2009 - cqvip.com
提出了一种无线传感器网络下的节点行为评测模型MA&TP-BRSN. MA&TP—BRSN
综合考虑了网内节点的多种内部攻击行为和自私行为, 并给出了对应于各类攻击的节点信任值的 …

[PDF][PDF] Review paper on security issues in mobile adhoc networks

V Goyal, G Arora - … Research Journal of Advanced Engineering and …, 2017 - irjaes.com
Mobile Ad Hoc Networks (MANETs) have received drastically increasing interest, partly
owing to the potential applicability of MANETs to myriad applications. The deployment of …

[PDF][PDF] A survey on security issues in wireless ad hoc network routing protocols

C Sreedhar, SM Verma, N Kasiviswanath - International Journal on …, 2010 - Citeseer
An ad hoc wireless network is a collection of wireless mobile nodes that self-configure to
construct a network without the need for any established infrastructure or backbone. Ad hoc …

WSNs 基于信誉机制的恶意节点识别模型

杨光, 印桂生, 杨武, 左东梅 - 哈尔滨工业大学学报, 2009 - cqvip.com
为了抵御无线传感器网络内部节点的拜占庭行为以及自私行为, 针对现有恶意节点识别系统检测
功能单一, 不可抵御高信誉节点的恶意诽谤行为等问题. 提出了一种无线传感器网络下的恶意 …

Collaborative backup for dependable mobile applications

MO Killijian, D Powell, M Banâtre, P Couderc… - Proceedings of the 2nd …, 2004 - dl.acm.org
We describe the work we are conducting on new middleware services for dependable and
secure mobile systems. This work is based on approaches à la peer-to-peer in order to …

Security issues in mobile ad hoc networks: A survey

S Kumar, K Dutta - … , Privacy, Trust, and Resource Management in …, 2014 - igi-global.com
Abstract A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network
of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not …

A novel reputation model for malicious node detection in wireless sensor network

G Yin, G Yang, Y Wu, X Yu… - 2008 4th International …, 2008 - ieeexplore.ieee.org
With the development of WSNs in the military and commercial fields, the security of WSNs is
becoming more and more important. The security threats of wireless sensor networks …