Cannabis Ruderalis

A survey on trust management for mobile ad hoc networks

JH Cho, A Swami, R Chen - IEEE communications surveys & …, 2010 - ieeexplore.ieee.org
Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when
collaboration or cooperation is critical to achieving mission and system goals such as …

Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

Statistical en-route filtering of injected false data in sensor networks

F Ye, H Luo, S Lu, L Zhang - IEEE Journal on selected areas in …, 2005 - ieeexplore.ieee.org
In a large-scale sensor network individual sensors are subject to security compromises. A
compromised node can be used to inject bogus sensing reports. If undetected, these bogus …

A survey of attacks and countermeasures in mobile ad hoc networks

B Wu, J Chen, J Wu, M Cardei - Wireless network security, 2007 - Springer
Security is an essential service for wired and wireless network communications. The
success of mobile ad hoc network (MANET) will depend on people's confidence in its …

Denial of service resilience in ad hoc networks

I Aad, JP Hubaux, EW Knightly - Proceedings of the 10th annual …, 2004 - dl.acm.org
Significant progress has been made towards making ad hoc networks secure and DoS
resilient. However, little attention has been focused on quantifying DoS resilience: Do ad …

Key management for beyond 5G mobile small cells: A survey

M De Ree, G Mantas, A Radwan, S Mumtaz… - IEEE …, 2019 - ieeexplore.ieee.org
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …

Secure and efficient key management in mobile ad hoc networks

B Wu, J Wu, EB Fernandez… - 19th IEEE International …, 2005 - ieeexplore.ieee.org
In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of
infrastructure, providing secure communications is a big challenge in this unique network …

Securing mobile ad hoc networks with certificateless public keys

Y Zhang, W Liu, W Lou, Y Fang - IEEE transactions on …, 2006 - ieeexplore.ieee.org
This paper studies key management, a fundamental problem in securing mobile ad hoc
networks (MANETs). We present IKM, an ID-based key management scheme as a novel …

[BOOK][B] Security for wireless ad hoc networks

F Anjum, P Mouchtaris - 2007 - books.google.com
This book addresses the problems and brings solutions to the security issues of ad-hoc
networks. Topics included are threat attacks and vulnerabilities, basic cryptography …

Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks

JH Cho, A Swami, R Chen - Journal of Network and Computer Applications, 2012 - Elsevier
We develop and analyze a trust management protocol for mission-driven group
communication systems in mobile ad hoc networks using hierarchical modeling techniques …

Leave a Reply