Security issues of mobile ad hoc and sensor networks

D Djenouri, L Khelladi, N Badache - 2005 - dl.cerist.dz
Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability
of wireless links, the limited physical protection of nodes, the dynamically changing …

Key management for beyond 5G mobile small cells: A survey

M De Ree, G Mantas, A Radwan, S Mumtaz… - IEEE …, 2019 - ieeexplore.ieee.org
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …

Security framework for wireless communications in smart distribution grid

X Wang, P Yi - IEEE Transactions on Smart Grid, 2011 - ieeexplore.ieee.org
Communication networks play a critical role in smart grid, as the intelligence of smart grid is
built based on information exchange across the power grid. In power transmission segments …

Location-aware combinatorial key management scheme for clustered sensor networks

MF Younis, K Ghumman… - IEEE transactions on …, 2006 - ieeexplore.ieee.org
Recent advances in wireless sensor networks (WSNs) are fueling the interest in their
application in a wide variety of sensitive settings such as battlefield surveillance, border …

Certification-based trust models in mobile ad hoc networks: A survey and taxonomy

M Omar, Y Challal, A Bouabdallah - Journal of Network and Computer …, 2012 - Elsevier
A mobile ad hoc network is a wireless communication network which does not rely on a pre-
existing infrastructure or any centralized management. Securing the exchanges in such …

Securing mobile ad hoc networks with certificateless public keys

Y Zhang, W Liu, W Lou, Y Fang - IEEE transactions on …, 2006 - ieeexplore.ieee.org
This paper studies key management, a fundamental problem in securing mobile ad hoc
networks (MANETs). We present IKM, an ID-based key management scheme as a novel …

[KNYGA][B] Security in wireless ad hoc and sensor networks

E Cayirci, C Rong - 2008 - books.google.com
This book provides an in-depth guide to security in wireless ad hoc and sensor networks
Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals …

A survey on peer-to-peer key management for mobile ad hoc networks

JVD Merwe, D Dawoud, S McDonald - ACM computing surveys (CSUR), 2007 - dl.acm.org
The article reviews the most popular peer-to-peer key management protocols for mobile ad
hoc networks (MANETs). The protocols are subdivided into groups based on their design …

A survey of survivability in mobile ad hoc networks

MN Lima, AL Dos Santos… - … Communications surveys & …, 2009 - ieeexplore.ieee.org
Many efforts have been done towards secure MANETs, but the conventional lines of defense
are still inefficient to put all attacks off. This article examines survivable approaches whose …

A survey of key management in ad hoc networks

AM Hegland, E Winjum, SF Mjolsnes… - … Surveys & Tutorials, 2006 - ieeexplore.ieee.org
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more
vulnerable to security attacks than their wired counterparts. The nodes act both as routers …