Secure opportunistic watchdog production in wireless sensor networks: a review
Finding the security vulnerabilities and solving the issues in Wireless Sensor Networks
(WSN) are mandatory tasks for providing secure data transmission. Attackers or intruders …
(WSN) are mandatory tasks for providing secure data transmission. Attackers or intruders …
Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning
Z Wei, H Tang, FR Yu, M Wang… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The distinctive features of mobile ad hoc networks (MANETs), including dynamic topology
and open wireless medium, may lead to MANETs suffering from many security …
and open wireless medium, may lead to MANETs suffering from many security …
[KNYGA][B] Security for wireless ad hoc networks
F Anjum, P Mouchtaris - 2007 - books.google.com
This book addresses the problems and brings solutions to the security issues of ad-hoc
networks. Topics included are threat attacks and vulnerabilities, basic cryptography …
networks. Topics included are threat attacks and vulnerabilities, basic cryptography …
Contradiction based gray-hole attack minimization for ad-hoc networks
Although quite popular for the protection for ad-hoc networks (MANETs, IoT, VANETs, etc.),
detection & mitigation techniques only function after the attack has commenced. Prevention …
detection & mitigation techniques only function after the attack has commenced. Prevention …
[PDF][PDF] Attacks against OLSR: Distributed key management for security
In Mobile Ad Hoc Networks (MANETs), mobile nodes use wireless devices to create
spontaneously a larger network, larger than radio range, in which communication with each …
spontaneously a larger network, larger than radio range, in which communication with each …
An advanced signature system for OLSR
In this paper we investigate security issues related to the Optimized Link State Routing
Protocol--one example of a proactive routing protocol for MANETs. We inventory the …
Protocol--one example of a proactive routing protocol for MANETs. We inventory the …
Trust-based security for the OLSR routing protocol
The trust is always present implicitly in the protocols based on cooperation, in particular,
between the entities involved in routing operations in Ad hoc networks. Indeed, as the …
between the entities involved in routing operations in Ad hoc networks. Indeed, as the …
A novel optimally weighted framework of piecewise gamma corrected fractional order masking for satellite image enhancement
A novel image quality enhancement framework is proposed here through a collective
inspiration of the exponential, differential and linear operational behavior of pixel intensities …
inspiration of the exponential, differential and linear operational behavior of pixel intensities …
Mitigating denial of service attacks in OLSR protocol using fictitious nodes
With the main focus of research in routing protocols for Mobile Ad-Hoc Networks (MANET)
geared towards routing efficiency, the resulting protocols tend to be vulnerable to various …
geared towards routing efficiency, the resulting protocols tend to be vulnerable to various …
An efficient routing protocol in mobile ad-hoc networks by using artificial immune system
Characteristics of the mobile ad-hoc networks such as nodes high mobility and limited
energy are regarded as the routing challenges in these networks. OLSR protocol is one of …
energy are regarded as the routing challenges in these networks. OLSR protocol is one of …