The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2013
DOI: 10.1007/978-3-642-36169-2_2
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues in Mobile Ad Hoc Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 54 publications
0
6
0
Order By: Relevance
“…In another study, Oh et al (2010) extended the concept of Content-Centric Networking (CCN) (Jacobson et al, 2009) The second group of studies attempted to address cybersecurity concerns in MANET systems. The open and distributed nature of MANET systems may make them more susceptible to malicious activities (Islam & Shaikh, 2013). One example of studies in this group is Bakar et al, (Bakar et al, 2012) which introduced a new MANET architecture that relies on an access control model for facilitating information transmission and preserving the integrity of data exchange operations.…”
Section: Manet Systems and Their Applications In Emergency Managementmentioning
confidence: 99%
“…In another study, Oh et al (2010) extended the concept of Content-Centric Networking (CCN) (Jacobson et al, 2009) The second group of studies attempted to address cybersecurity concerns in MANET systems. The open and distributed nature of MANET systems may make them more susceptible to malicious activities (Islam & Shaikh, 2013). One example of studies in this group is Bakar et al, (Bakar et al, 2012) which introduced a new MANET architecture that relies on an access control model for facilitating information transmission and preserving the integrity of data exchange operations.…”
Section: Manet Systems and Their Applications In Emergency Managementmentioning
confidence: 99%
“…For edge computing, various studies on security of several edge computing archetypes have been reported, e.g. fog computing [6][7][8][9][10], mobile edge computing [10][11][12], mobile cloud computing [13][14][15], and mobile ad-hoc cloud computing [16][17][18]. These preliminary analyses examine security threats that influence the integrity of these edge computing archetypes, together with an overview of the security procedures of defending all functions and infrastructures.…”
Section: B Related Workmentioning
confidence: 99%
“…They also provided complete security solutions for Mobile Ad hoc Networks. Bing Wu et al [27] had a survey on various attacks and their solutions in Mobile Ad hoc Networks. They proposed various solutions to reduce security vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%