Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-6 of 6 total results
 A Literature Review of Security Attack in Mobile Ad-hoc ...
adaptive. Device in mobile ad hoc network should be able to detect the presence of other devices and perform necessary set up to facilitate communication and sharing of data and service. Ad hoc networking allows the devices to maintain connections to the network as well as easily adding and removing devices to and from the network....
A survey of secure wireless ad hoc routing - IEEE Journals ...
Abstract: Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Attacks on ad hoc network routing protocols disrupt network performance and reliability. The article reviews attacks on ad hoc networks and discusses current approaches for establishing cryptographic keys in ad hoc networks....
Wireless ad hoc network - Wikipedia
A wireless ad hoc network (WANET) or Mobile ad hoc network (MANET) is a decentralized type of wireless network. The network is ad hoc because it does not rely on a pre-existing infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data for other nodes, so the determination of ......
Secure Routing and Data Transmission in Mobile Ad Hoc Networks
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 DOI : 10.5121/ijcnc.2014.6108 111 Secure Routing and Data Transmission in Mobile Ad Hoc Networks Waleed S. Alnumay and Uttam Ghosh
https://arxiv.org/pdf/1402.2108
Average Rating (0 votes)
An Opportunistic Routing to Encounter Black Hole Attack in ...
This paper proposes a routing mechanism that is designed to prevent a black hole attack on Ad-hoc On-demand Distance Vector-based Mobile Ad-hoc Networks. The proposed approach will provide security to the data that is sent from source to destination using multiple paths and it will protect the data from the Black Hole Attack....
A review of routing protocols for mobile ad hoc networks ...
Elizabeth M. Royer & Chai-Keong Toh, "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks". Google Scholar; P. Papadimitratos and Z.J. Haas. "Secure routing: Secure Data Transmission in Mobile Ad Hoc Networks", Proc. ACM Wksp. Wireless Security 2003, Sept. 2003, pp. 41-50. Google Scholar Digital Library...