Security in Ad-Hoc Networks (MANETS)

作者: Piyush Kumar Shukla , Kirti Raj Bhatele , None

DOI: 10.4018/978-1-4666-8687-8.CH010

关键词:

摘要:

参考文章(18)
Kamaljit I Lakhtaria, None, Protecting Computer Network with Encryption Technique: A Study ubiquitous computing. pp. 381- 390 ,(2011) , 10.1007/978-3-642-20998-7_47
Ewerton L. Madruga, J.J. Garcia-Luna-Aceves, Scalable multicasting: the core-assisted mesh protocol Mobile Networks and Applications. ,vol. 6, pp. 151- 165 ,(2001) , 10.1023/A:1011400407314
Kamaljit I. Lakhtaria, Analyzing Zone Routing Protocol in MANET Applying Authentic Parameter arXiv: Networking and Internet Architecture. ,(2010)
Yih-Chun Hu, David B. Johnson, Adrian Perrig, Efficient Security Mechanisms for Routing Protocolsa. network and distributed system security symposium. ,(2003)
J. Macker, S. Corson, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations Request For Comments. ,vol. 2501, pp. 1- 12 ,(1999)
Danilo Bruschi, Emilia Rosti, Secure multicast in wireless networks of mobile hosts: protocols and issues Mobile Networks and Applications. ,vol. 7, pp. 503- 511 ,(2002) , 10.1023/A:1020781305639
P. Annadurai, V. Palanisamy, Impact of Rushing attack on Multicast in Mobile Ad Hoc Network arXiv: Cryptography and Security. ,(2009)
Hoang Lan Nguyen, Uyen Trang Nguyen, A study of different types of attacks on multicast in mobile ad hoc networks ad hoc networks. ,vol. 6, pp. 32- 46 ,(2008) , 10.1016/J.ADHOC.2006.07.005
Richa Agrawal, Rajeev Tripathi, Sudarshan Tiwari, Performance Evaluation and Comparison of AODV and DSR Under Adversarial Environment international conference on computational intelligence and communication networks. pp. 596- 600 ,(2011) , 10.1109/CICN.2011.129