An Efficient Broadcast Authentication Scheme for Ad Hoc Routing Protocols (original) (raw)

Dynamic Authenticated Route for Risk Attacks in Ad Hoc Networks

C. Chandra Prabha

2014

View PDFchevron_right

Guest Editorial Security in Wireless Ad Hoc Networks

Paul Kolodzy

IEEE Journal on Selected Areas in Communications, 2006

View PDFchevron_right

Authenticating ad hoc networks by comparison of short digests

Long Nguyen

2008

View PDFchevron_right

Security Schemes in Ad Hoc Networks a Survey and New Challenges

Sherif El-kassas

ubicc.org

View PDFchevron_right

An Efficient and Secure Routing Protocol for Mobile Ad-Hoc Networks

Akshay Atrey

International journal of Computer Networks & Communications, 2010

View PDFchevron_right

Security Issues in Mobile Ad Hoc Networks

Vijay Babu

International Journal of Distributed Sensor Networks, 2012

View PDFchevron_right

A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks

Maryline Laurent

2011 5th International Conference on Network and System Security, 2011

View PDFchevron_right

Efficient Security Approaches in Mobile Ad-Hoc Networks: A Survey

Prashant Sangulagi

International Journal of Research in Engineering and Technology, 2014

View PDFchevron_right

Secure Position Aided Ad hoc Routing

Alec Yasinsac

Florida State University, 2002

View PDFchevron_right

A Secure Zero Knowledge Authentication Protocol for Wireless (Mobile) Ad-Hoc Networks

Manoj Kumar Misra

International Journal of Computer Applications, 2015

View PDFchevron_right

A Bio-Inspired Autonomous Authentication Mechanism in Mobile Ad Hoc Networks

Parisa Memarmoshrefi

View PDFchevron_right

Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks

Sanaa Mohamed Ahmed Taha

IEEE Transactions on Parallel and Distributed Systems, 2014

View PDFchevron_right

Article CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks †

Wassim Itani

2015

View PDFchevron_right

Review of Mobile Ad Hoc Network Protocols

Oyenike M . Olanrewaju

2015

View PDFchevron_right

Authentication schemes for wireless sensor networks

Ali Chehab

MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference, 2014

View PDFchevron_right

A Survey on Wireless Ad Hoc Networks

Luís Henrique Maciel Kosmalski Costa

Springer eBooks, 2006

View PDFchevron_right

Security for Context-Aware ad-hoc Networking Applications

Yeda Regina Venturini

IFIP International Federation for Information Processing

View PDFchevron_right

Routing protocols in Mobile Ad-hoc Networks

Bratislav Mikarić

PRZEGLĄD ELEKTROTECHNICZNY, 2020

View PDFchevron_right

Report of the second Ad Hoc Network Management Review Group

Vint Cerf

1989

View PDFchevron_right

ESPR: Efficient Security Scheme for Position-Based Routing in Vehicular Ad Hoc Networks

Khaled H. Almotairi

2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010

View PDFchevron_right

Reducing the Vulnerability of Broadcast Authentication against Denial of Service Attacks in Wireless Sensor Networks

Iman Almomani

View PDFchevron_right

An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks

Marimuthu Karuppiah

Security and Communication Networks, 2016

View PDFchevron_right

Implementing Security Features in MANET Routing Protocols

Abhishek Vyas

International Journal of Computer Network and Information Security, 2018

View PDFchevron_right

Authentication protocols for ad hoc networks

Jean-jacques Quisquater

Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks - Q2SWinet '05, 2005

View PDFchevron_right

Comprehensive Survey of Security Issues in Routing Protocols of Manets

Nisha Yadav

International Journal of Computer Applications, 2015

View PDFchevron_right

LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks

Shouhuai Xu

23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings., 2003

View PDFchevron_right

Mobile Ad Hoc Networks

jesus ortiz

Encyclopedia of Information Science and Technology, Second Edition

View PDFchevron_right

Security bootstrapping of mobile ad hoc networks using identity-based cryptography

Kamal Adli Mehr

Security and Communication Networks, 2016

View PDFchevron_right

Reputed Authenticated Routing Ad-Hoc Networks Protocol

Ahmed Sameh

Lecture Notes in Electrical Engineering, 2009

View PDFchevron_right

CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks

Wassim Itani

Sensors, 2015

View PDFchevron_right

Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure

Saurabh Bagchi

IEEE Transactions on Mobile Computing, 2011

View PDFchevron_right

A multicast routing protocol for ad-hoc networks

Jim Breen

IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), 1999

View PDFchevron_right

Broadcast authentication with hashed random preloaded subsets

Mahalingam Ramkumar

ePrint Archive, 2005

View PDFchevron_right

Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN)

Ahmed Sameh

Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks - PE-WASUN '05, 2005

View PDFchevron_right