Key management for beyond 5G mobile small cells: A survey
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …
are unanimous that densification of mobile networks is the way forward. The densification …
A survey on peer-to-peer key management for mobile ad hoc networks
JVD Merwe, D Dawoud, S McDonald - ACM computing surveys (CSUR), 2007 - dl.acm.org
The article reviews the most popular peer-to-peer key management protocols for mobile ad
hoc networks (MANETs). The protocols are subdivided into groups based on their design …
hoc networks (MANETs). The protocols are subdivided into groups based on their design …
Information theoretic security
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …
are reviewed. The basic wire-tap channel model is considered first, and then several specific …
A survey of attacks and countermeasures in mobile ad hoc networks
Security is an essential service for wired and wireless network communications. The
success of mobile ad hoc network (MANET) will depend on people's confidence in its …
success of mobile ad hoc network (MANET) will depend on people's confidence in its …
Secure and efficient key management in mobile ad hoc networks
B Wu, J Wu, EB Fernandez… - 19th IEEE International …, 2005 - ieeexplore.ieee.org
In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of
infrastructure, providing secure communications is a big challenge in this unique network …
infrastructure, providing secure communications is a big challenge in this unique network …
[LIBRO][B] Security in wireless ad hoc and sensor networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks
Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals …
Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals …
A survey of key management in ad hoc networks
AM Hegland, E Winjum, SF Mjolsnes… - … Surveys & Tutorials, 2006 - ieeexplore.ieee.org
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more
vulnerable to security attacks than their wired counterparts. The nodes act both as routers …
vulnerable to security attacks than their wired counterparts. The nodes act both as routers …
Opportunistic sensing: Security challenges for the new paradigm
We study the security challenges that arise in opportunistic people-centric sensing, a new
sensing paradigm leveraging humans as part of the sensing infrastructure. Most prior sensor …
sensing paradigm leveraging humans as part of the sensing infrastructure. Most prior sensor …
[LIBRO][B] Network Protocols and Applications
ZigBee Network Protocols and Applications Page 1 ZigBee ® N etw ork Protocols and A
pplications Edited by Chonggang Wang • Tao Jiang • Qian Zhang ZigBee® Network Protocols …
pplications Edited by Chonggang Wang • Tao Jiang • Qian Zhang ZigBee® Network Protocols …
A localized certificate revocation scheme for mobile ad hoc networks
G Arboit, C Crépeau, CR Davis, M Maheswaran - Ad hoc networks, 2008 - Elsevier
The issue of certificate revocation in mobile ad hoc networks (MANETs) where there are no
on-line access to trusted authorities, is a challenging problem. In wired network …
on-line access to trusted authorities, is a challenging problem. In wired network …