2006
DOI: 10.1002/0470118474
|View full text |Cite
|
Sign up to set email alerts
|

Security for Wireless Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
93
0
3

Year Published

2008
2008
2016
2016

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 117 publications
(97 citation statements)
references
References 0 publications
0
93
0
3
Order By: Relevance
“…However, there arise a number of security threats in wireless networks, especially in wireless ad hoc networks 1 , which have often been deployed in areas without infrastructure support. These security issues in wireless ad hoc networks are different from those in conventional wired networks due to the unique features of wireless ad hoc networks.…”
Section: Introductionmentioning
confidence: 99%
“…However, there arise a number of security threats in wireless networks, especially in wireless ad hoc networks 1 , which have often been deployed in areas without infrastructure support. These security issues in wireless ad hoc networks are different from those in conventional wired networks due to the unique features of wireless ad hoc networks.…”
Section: Introductionmentioning
confidence: 99%
“…The pheromone value depending on the number of hops the forward ant needed to reach the node. Initiate pheromone value for all nodes route table calculated by Equation (1).…”
Section: B Intantsensementioning
confidence: 99%
“…INTRODUCTION Mobile Ad-Hoc Network (MANET) is a recent developed part of wireless communication and expected to become an important part of the future generation architecture [1] . One of the major issues that affect the performance of an ad hoc network is the way of routing implemented in a network governed by mobility and dynamic network size.…”
mentioning
confidence: 99%
“… Black-hole attack (Anjum, Mouchtaris, 2007): In this attack, a misbehaving node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. The attacker will then receive the traffic destined for other nodes, then can drop or modify the packets.…”
Section: Simulated Attacksmentioning
confidence: 99%