2002
DOI: 10.1201/9781420040401.ch30
|View full text |Cite
|
Sign up to set email alerts
|

Security in Wireless Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2005
2005
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 50 publications
(21 citation statements)
references
References 25 publications
0
21
0
Order By: Relevance
“…Network Simulator (NS-2) NS2 [9] is an open-source eventdriven simulator designed specifically for research in computer communication network. Since its inception in 1989, NS2 has continuously gained tremendous interest from industry, academic world, and government.…”
Section: Simulation Tool Used and Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Network Simulator (NS-2) NS2 [9] is an open-source eventdriven simulator designed specifically for research in computer communication network. Since its inception in 1989, NS2 has continuously gained tremendous interest from industry, academic world, and government.…”
Section: Simulation Tool Used and Resultsmentioning
confidence: 99%
“…The term Availability means that a node should maintain its ability to provide all the designed services regardless of the security state of it [9].…”
Section: Availabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Impersonation attack is a severe threat to the safety of mobile accidental network [11]. As we can see, if there is not such a suitably authentication mechanism between the nodes, the human can capture some nodes in the network and arrange them emerge like benign nodes.…”
Section: Impersonationmentioning
confidence: 99%
“…Such a distinction would have been based on a security policy, the possession of the necessary credentials, and the ability of nodes to validate them. In the case of wireless ad hoc networks, there might have been no ground for an a priori classification, since all nodes were required to cooperate in supporting the network operation, while no prior security association could be assumed for all the network nodes [18].…”
Section: Ids For Wireless Ad-hoc Networkmentioning
confidence: 99%