2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 2015
DOI: 10.1109/icitst.2015.7412128
|View full text |Cite
|
Sign up to set email alerts
|

Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…It implements a Virtual Closed Network [18] architecture to protect both network and application data. This is in contrast with the approaches proposed in previous work, which focus on protecting specific communication-based services.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…It implements a Virtual Closed Network [18] architecture to protect both network and application data. This is in contrast with the approaches proposed in previous work, which focus on protecting specific communication-based services.…”
Section: Discussionmentioning
confidence: 99%
“…In a closed network, participation is restricted to authorised nodes, and communication is encrypted to prevent third-party comprehension of the contents of network communication. Authentication is required to allow new nodes to join and be seen as legitimate by existing network members [18].…”
Section: Security Threatsmentioning
confidence: 99%
See 1 more Smart Citation