An Efficient Broadcast Authentication Scheme for Ad Hoc Routing Protocols (original) (raw)
Related papers
Dynamic Authenticated Route for Risk Attacks in Ad Hoc Networks
2014
Guest Editorial Security in Wireless Ad Hoc Networks
IEEE Journal on Selected Areas in Communications, 2006
Authenticating ad hoc networks by comparison of short digests
2008
Security Schemes in Ad Hoc Networks a Survey and New Challenges
ubicc.org
An Efficient and Secure Routing Protocol for Mobile Ad-Hoc Networks
International journal of Computer Networks & Communications, 2010
Security Issues in Mobile Ad Hoc Networks
International Journal of Distributed Sensor Networks, 2012
A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks
2011 5th International Conference on Network and System Security, 2011
Efficient Security Approaches in Mobile Ad-Hoc Networks: A Survey
International Journal of Research in Engineering and Technology, 2014
Secure Position Aided Ad hoc Routing
Florida State University, 2002
A Secure Zero Knowledge Authentication Protocol for Wireless (Mobile) Ad-Hoc Networks
International Journal of Computer Applications, 2015
A Bio-Inspired Autonomous Authentication Mechanism in Mobile Ad Hoc Networks
Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks
IEEE Transactions on Parallel and Distributed Systems, 2014
2015
Review of Mobile Ad Hoc Network Protocols
2015
Authentication schemes for wireless sensor networks
MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference, 2014
A Survey on Wireless Ad Hoc Networks
Luís Henrique Maciel Kosmalski Costa
Springer eBooks, 2006
Security for Context-Aware ad-hoc Networking Applications
IFIP International Federation for Information Processing
Routing protocols in Mobile Ad-hoc Networks
PRZEGLĄD ELEKTROTECHNICZNY, 2020
Report of the second Ad Hoc Network Management Review Group
1989
ESPR: Efficient Security Scheme for Position-Based Routing in Vehicular Ad Hoc Networks
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010
An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks
Security and Communication Networks, 2016
Implementing Security Features in MANET Routing Protocols
International Journal of Computer Network and Information Security, 2018
Authentication protocols for ad hoc networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks - Q2SWinet '05, 2005
Comprehensive Survey of Security Issues in Routing Protocols of Manets
International Journal of Computer Applications, 2015
LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks
23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings., 2003
Encyclopedia of Information Science and Technology, Second Edition
Security bootstrapping of mobile ad hoc networks using identity-based cryptography
Security and Communication Networks, 2016
Reputed Authenticated Routing Ad-Hoc Networks Protocol
Lecture Notes in Electrical Engineering, 2009
Sensors, 2015
Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
IEEE Transactions on Mobile Computing, 2011
A multicast routing protocol for ad-hoc networks
IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), 1999
Broadcast authentication with hashed random preloaded subsets
ePrint Archive, 2005
Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN)
Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks - PE-WASUN '05, 2005