Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies 2016
DOI: 10.1145/2905055.2905187
|View full text |Cite
|
Sign up to set email alerts
|

Prioritization of Security Measures at the Junction of MANET and IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…In [22], Xu et al presented a mathematical framework and analyzed the routing protocols in order to find the efficacy of the algorithms. In [23], Rath et al described major safety and security related issues for MANET connected Internet of Things (IoT). They focused on the vulnerability and security threat for ubiquitous computing and IoT in light of ad hoc network formation on the fly.…”
Section: Related Workmentioning
confidence: 99%
“…In [22], Xu et al presented a mathematical framework and analyzed the routing protocols in order to find the efficacy of the algorithms. In [23], Rath et al described major safety and security related issues for MANET connected Internet of Things (IoT). They focused on the vulnerability and security threat for ubiquitous computing and IoT in light of ad hoc network formation on the fly.…”
Section: Related Workmentioning
confidence: 99%