Cannabis Ruderalis

Well-architected wireless network security

AA Mughal - Journal of Humanities and Applied Science …, 2022 - journals.sagescience.org
In this comprehensive research article, we explore the critical aspects of well-architected
wireless network security. We examine the fundamental principles of wireless security …

Key management for beyond 5G mobile small cells: A survey

M De Ree, G Mantas, A Radwan, S Mumtaz… - IEEE …, 2019 - ieeexplore.ieee.org
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …

Secure routing in wireless sensor networks: Attacks and countermeasures

C Karlof, D Wagner - Ad hoc networks, 2003 - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing
protocols have been proposed, but none of them have been designed with security as a …

Certification-based trust models in mobile ad hoc networks: A survey and taxonomy

M Omar, Y Challal, A Bouabdallah - Journal of Network and Computer …, 2012 - Elsevier
A mobile ad hoc network is a wireless communication network which does not rely on a pre-
existing infrastructure or any centralized management. Securing the exchanges in such …

Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks

S Zhong, J Chen, YR Yang - IEEE INFOCOM 2003. Twenty …, 2003 - ieeexplore.ieee.org
Mobile ad hoc networking has been an active research area for several years. How to
stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In …

[PDF][PDF] Prevention of cooperative black hole attack in wireless ad hoc networks.

S Ramaswamy, H Fu, M Sreekantaradhya… - … conference on wireless …, 2003 - Citeseer
Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications.
The dynamic topology of MANETs allows nodes to join and leave the network at any point of …

CHURP: dynamic-committee proactive secret sharing

SKD Maram, F Zhang, L Wang, A Low… - Proceedings of the …, 2019 - dl.acm.org
We introduce CHURP (CHUrn-Robust Proactive secret sharing). CHURP enables secure
secret-sharing in dynamic settings, where the committee of nodes storing a secret changes …

Security framework for wireless communications in smart distribution grid

X Wang, P Yi - IEEE Transactions on Smart Grid, 2011 - ieeexplore.ieee.org
Communication networks play a critical role in smart grid, as the intelligence of smart grid is
built based on information exchange across the power grid. In power transmission segments …

Efficient persist barriers for multicores

A Joshi, V Nagarajan, M Cintra, S Viglas - Proceedings of the 48th …, 2015 - dl.acm.org
Emerging non-volatile memory technologies enable fast, fine-grained persistence compared
to slow block-based devices. In order to ensure consistency of persistent state, dirty cache …

A trust model based routing protocol for secure ad hoc networks

X Li, MR Lyu, J Liu - 2004 IEEE aerospace conference …, 2004 - ieeexplore.ieee.org
Security issues have been emphasized when mobile ad hoc networks (MANETs) are
employed into military and aerospace fields. We design a novel secure routing protocol for …

Leave a Reply