Key management for beyond 5G mobile small cells: A survey

M De Ree, G Mantas, A Radwan, S Mumtaz… - IEEE …, 2019 - ieeexplore.ieee.org
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …

A survey on peer-to-peer key management for mobile ad hoc networks

JVD Merwe, D Dawoud, S McDonald - ACM computing surveys (CSUR), 2007 - dl.acm.org
The article reviews the most popular peer-to-peer key management protocols for mobile ad
hoc networks (MANETs). The protocols are subdivided into groups based on their design …

Information theoretic security

Y Liang, HV Poor, S Shamai - Foundations and Trends® in …, 2009 - nowpublishers.com
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …

A survey of attacks and countermeasures in mobile ad hoc networks

B Wu, J Chen, J Wu, M Cardei - Wireless network security, 2007 - Springer
Security is an essential service for wired and wireless network communications. The
success of mobile ad hoc network (MANET) will depend on people's confidence in its …

Secure and efficient key management in mobile ad hoc networks

B Wu, J Wu, EB Fernandez… - 19th IEEE International …, 2005 - ieeexplore.ieee.org
In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of
infrastructure, providing secure communications is a big challenge in this unique network …

[LIBRO][B] Security in wireless ad hoc and sensor networks

E Cayirci, C Rong - 2008 - books.google.com
This book provides an in-depth guide to security in wireless ad hoc and sensor networks
Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals …

A survey of key management in ad hoc networks

AM Hegland, E Winjum, SF Mjolsnes… - … Surveys & Tutorials, 2006 - ieeexplore.ieee.org
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more
vulnerable to security attacks than their wired counterparts. The nodes act both as routers …

Opportunistic sensing: Security challenges for the new paradigm

A Kapadia, D Kotz… - 2009 First International …, 2009 - ieeexplore.ieee.org
We study the security challenges that arise in opportunistic people-centric sensing, a new
sensing paradigm leveraging humans as part of the sensing infrastructure. Most prior sensor …

[LIBRO][B] Network Protocols and Applications

C Wang, T Jiang, QZB Zhang - 2016 - api.taylorfrancis.com
ZigBee Network Protocols and Applications Page 1 ZigBee ® N etw ork Protocols and A
pplications Edited by Chonggang Wang • Tao Jiang • Qian Zhang ZigBee® Network Protocols …

A localized certificate revocation scheme for mobile ad hoc networks

G Arboit, C Crépeau, CR Davis, M Maheswaran - Ad hoc networks, 2008 - Elsevier
The issue of certificate revocation in mobile ad hoc networks (MANETs) where there are no
on-line access to trusted authorities, is a challenging problem. In wired network …