Security issues of mobile ad hoc and sensor networks

D Djenouri, L Khelladi, N Badache - 2005 - dl.cerist.dz
Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability
of wireless links, the limited physical protection of nodes, the dynamically changing …

A survey on the usability and practical applications of graphical security models

JB Hong, DS Kim, CJ Chung, D Huang - Computer Science Review, 2017 - Elsevier
This paper presents and discusses the current state of Graphical Security Models (GrSM), in
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …

Securing ad hoc routing protocols

MG Zapata, N Asokan - Proceedings of the 1st ACM workshop on …, 2002 - dl.acm.org
We consider the problem of incorporating security mechanisms into routing protocols for ad
hoc networks. Canned security solutions like IPSec are not applicable. We look at AODV [21] …

Position verification approaches for vehicular ad hoc networks

T Leinmuller, E Schoch, F Kargl - IEEE Wireless …, 2006 - ieeexplore.ieee.org
Intervehicle communication is regarded as one of the major applications of mobile ad hoc
networks (MANETs). Compared to MANETs, these so-called vehicular ad hoc networks …

CoCoWa: A collaborative contact-based watchdog for detecting selfish nodes

E Hernandez-Orallo, MDS Olmos… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) assume that mobile nodes voluntary cooperate in order
to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to …

A survey of survivability in mobile ad hoc networks

MN Lima, AL Dos Santos… - … Communications surveys & …, 2009 - ieeexplore.ieee.org
Many efforts have been done towards secure MANETs, but the conventional lines of defense
are still inefficient to put all attacks off. This article examines survivable approaches whose …

Improved security in geographic ad hoc routing through autonomous position verification

T Leinmüller, C Maihöfer, E Schoch… - Proceedings of the 3rd …, 2006 - dl.acm.org
Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc
networks (MANETs). Compared to other MANETs, these so called vehicular ad hoc networks …

Efficient selfish node detection using SVM in IoT‐MANET environment

S Ghosh, A Banerjee, A Sufian… - Transactions on …, 2023 - Wiley Online Library
The communication between nodes in the Internet of Things‐based mobile ad‐hoc networks
environment is typically dependent on their selfless attitude. Whenever a node needs to …

Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks

K Shah, D **wala - Frontiers of Computer Science, 2021 - Springer
Abstract The Wireless Sensor Networks (WSNs) used for the monitoring applications like
pipelines carrying oil, water, and gas; perimeter surveillance; border monitoring; and …

Fighting against packet drop** misbehavior in multi-hop wireless ad hoc networks

A Baadache, A Belmehdi - Journal of Network and Computer Applications, 2012 - Elsevier
In multi-hop wireless ad hoc networks, the packets are forwarded through intermediate
nodes along the source–destination path. Without having any control on packets forwarding …