[PDF][PDF] Performance Evaluation of AODV variants on DDOS, Blackhole

H Simaremare, RF Sari - IJCSNS, 2011 - researchgate.net
This paper reviews security issues on Adhoc network and Ad hoc On-Demand Distance
Vector (AODV) protocol. In Adhoc network, active attack ie DDOS, blackhole and malicious …

Recent trends and benefits of remanufacturing: from closed loop businesses to synergetic networks

R Steinhilper - Proceedings second international symposium on …, 2001 - ieeexplore.ieee.org
By presenting a global perspective of current technology trends and business plans of key
remanufacturing activities in various industries, this contribution identifies remanufacturing …

Securing mobile Ad hoc networks: key management and routing

KK Chauhan, AKS Sanger - arxiv preprint arxiv:1205.2432, 2012 - arxiv.org
Secure communication between two nodes in a network depends on reliable key
management systems that generate and distribute keys between communicating nodes and …

Securing on-demand source routing in MANETs

KK Chauhan, AKS Sanger… - … on Computer and …, 2010 - ieeexplore.ieee.org
Mobile Ad hoc Networks (MANETs) are open to a wide range of attacks due to their unique
characteristics such as dynamic topology, open medium, absence of infrastructure, multi hop …

Identity-based threshold key management for ad hoc networks

Y Zhang, J Liu, Y Wang, J Han… - 2008 IEEE Pacific-Asia …, 2008 - ieeexplore.ieee.org
Ad hoc network is a collection of wireless mobile nodes that could be self-configured with no
aid of any established infrastructure, which, however, is commonly susceptible to various …

A secure key management system in group structured mobile ad hoc networks

KK Chauhan, S Tapaswi - 2010 IEEE International Conference …, 2010 - ieeexplore.ieee.org
Security of networks depends on reliable key management systems which generate and
distribute symmetrical/asymmetrical encryption/decryption keys between communicating …

[PDF][PDF] Group Rekeying Management Scheme for Mobile Ad-hoc Network

P Sharma, S Mewada, A Bilavariya - International Journal of …, 2013 - researchgate.net
Revised: 26 Nov 2013 Accepted: 20 Dec 2013 Published: 30 Dec 2013 Abstract-Ensuring
security in Mobile Ad-hoc Network is a challenging issue Many emerging applications in …

Key Management for Group Based Mobile Ad Hoc Networks

KK Chauhan, AKS Sanger - … , CCSIT 2012, Bangalore, India, January 2-4 …, 2012 - Springer
Security of a network depends on reliable key management systems that generate and
distribute keys between communicating parties in network. Due to lack of central server and …

Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks

L Sánchez, J Lanza, L Muñoz, K Ahola… - Wireless personal …, 2010 - Springer
Mobile ad hoc networking has been a hot research topic for a decade or so, and many
paradigms have been making use of it. One of these paradigms is the Personal Networks …

[PDF][PDF] A Study on Key Management in MANETs

CM Gulzar, P Nageshwar, SI Pasha - academia.edu
Group key management is one of the basic building blocks in collaborative and group-
oriented applications in Mobile Ad Hoc Networks (MANETs). Group key establishment …