A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A survey on peer-to-peer key management for mobile ad hoc networks
2007
ACM Computing Surveys
-peer key management, pairwise key management ACM Reference Format: van der Merwe, J., Dawoud, D., and McDonald, S. 2007. A survey on peer-to-peer key management for mobile ad hoc networks. ...
The article reviews the most popular peer-to-peer key management protocols for mobile ad hoc networks (MANETs). ...
ACKNOWLEDGMENTS The authors would like to thank the anonymous reviewers for their insightful comments and suggestions. ...
doi:10.1145/1216370.1216371
fatcat:rcauxrgg7vgurhyibno5cqms6m
Security considerations in ad hoc sensor networks
2005
Ad hoc networks
This paper analyzes security challenges in wireless sensor networks and summarizes key issues that need be solved for achieving security in an ad hoc network. ...
In future smart environments, ad hoc sensor networks will play a key role in sensing, collecting, and disseminating information about environmental phenomena. ...
State-of-the-art Currently there are some key management schemes that can be partially used for securing ASN environments even though most of those schemes are proposed for general ad hoc networks. • Hybrid ...
doi:10.1016/j.adhoc.2003.09.009
fatcat:kiutsu2bvbgcfehtniqdwjbmdm
A Design Approach for Wireless Communication Security in Bluetooth Network
2014
International Journal of Security and Its Applications
Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. ...
It is the kind of wireless Ad hoc network. Low cost, low power, low complexity and robustness are the basic features of Bluetooth. It works on Radio frequency. ...
To applications such as large ad hoc networks and outside interconnection access, high level security schemes should preferably be enforced for complementation. ...
doi:10.14257/ijsia.2014.8.2.35
fatcat:csbqfltz7fc4bfek7xju2zte5q
Spontaneous Ad Hoc Mobile Cloud Computing Network
2014
The Scientific World Journal
For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. ...
In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. ...
If we want to create a spontaneous ad hoc network for mobile cloud computing, we need trust establishment, key management, and membership control. ...
doi:10.1155/2014/232419
pmid:25202715
pmcid:PMC4151486
fatcat:uczjwx6cwve5hepy2n6e3aogoa
Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks
2018
EURASIP Journal on Wireless Communications and Networking
In mobile ad hoc networks (MANETs), the reliability of nodes, quality of data and access control cannot be achieved successfully for various network functionalities through traditional cryptographic security ...
Therefore, it is of great importance that efficient trust management mechanisms should be developed in a public key infrastructure (PKI), in order to verify the identities on the ad hoc networks for reliable ...
Acknowledgements The authors would like to thank the Computer Network Laboratory of Thiagarajar College of Engineering for the support in the development and simulation of the concept. ...
doi:10.1186/s13638-017-1001-5
fatcat:ypjrkrfbprbhxf6pumcqolpwci
Connecting the worlds: Multipoint videoconferencing integrating H.323 and IPv4, SIP and IPv6 with autonomous sender authentication
2009
2009 IEEE 13th International Symposium on Consumer Electronics
network. ...
Built upon an underlying peer-to-peer communication scheme, it further supports advanced integration with legacy MCUs and thereby enables hybrid sessions that extend into the H.323 world. ...
The daViKo system operates in ad hoc mode and relies on the latter scheme that allows for personal identification of a callee. ...
doi:10.1109/isce.2009.5157038
fatcat:rlqjt7jpcfagdaqcaeulvg4lku
Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis
2005
EURASIP Journal on Wireless Communications and Networking
This paper proposes a modification to the existing "fully distributed certificate authority" scheme for ad hoc networks. ...
Security poses a major challenge in ad hoc networks today due to the lack of fixed or organizational infrastructure. ...
Aparna Nagesh for performing the simulations required for the plots. ...
doi:10.1155/wcn.2005.579
fatcat:7m2ix5mhxzenpe64xddomhusj4
Enhanced Ring Signatures Schemes for Privacy Preservation in Wireless Sensor Networks
2014
International Journal of Modern Education and Computer Science
As the application of the wireless sensor network is increasing, there is an emerging need for the security and privacy scheme which makes the network secure from various attacks and hide the ongoing activities ...
Each of the schemes induce some overhead in the network. A light weight scheme is always desired for resource constraint wireless sensor networks. ...
which are now-adays very popularly known as ad-hoc groups. ad-hoc group are highly dynamic in nature so it creates new challenges for net-working and its security. ...
doi:10.5815/ijmecs.2014.11.08
fatcat:obzjek6xhbeildmx76kkibrmqa
Detection and Prevention of Black Hole Attack in MANET
2016
International Journal of Scientific Research and Management
Such nodes are selected and blackhole attack is launched targeting them, thereby damaging more number of paths in a single attempt.Further, the attacker selects only those genuine nodes through more than ...
Broadly speaking, in the proposed blackhole attack, the attacker looks for nodes through which many alternative paths of multipath AODV passes through. ...
Related Work The problem of security and cooperation enforcement has received considerable attention by researchers in the ad hoc network community. ...
doi:10.18535/ijsrm/v4i9.07
fatcat:zzt65smm5jf3deb54lzcijzo5q
Hybrid Broadcast Encryption and Group Key Agreement Protocol with Precise Cipher Texts
2021
Turkish Journal of Computer and Mathematics Education
The purpose of Group Key Accord (GKAP) protocol is for negotiate all the assembly members and designing a familiar encryption key through the network. ...
In cryptographic system so as to manage the group of members, the group key management protocol is used and it also should provide the security to the group of members which means the communication among ...
The new computational tools are like instant messaging, group-oriented communications, social media and mobile ad hoc networks. These novel schemes are said to be cryptographic techniques. ...
doi:10.17762/turcomat.v12i5.1742
fatcat:s544zvkx2beq5oidpxwsm6j64q
DESIGN, IMPLEMENTATION, AND EVALUATION OF BLUETOOTH SECURITY
2001
Wireless LANs and Home Networks
Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. ...
Then both link-level and service-level security schemes are discussed in detail on the basis of the framework. ...
To applications such as large ad hoc networks and outside interconnection access, high level security schemes should preferably be enforced for complementation. Examples include e.g. ...
doi:10.1142/9789812799562_0012
fatcat:wyyw4os3cnebdmmnxyc45zp33i
Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona
[chapter]
2002
Lecture Notes in Computer Science
This problem cannot be avoided, because the signals must propagate in all directions from the base stations, terminals, and communicating components of mobile ad hoc networks (MANETs) that support mobility ...
The improved WEP no longer has a shared key for the packets; instead it now has a unique key for every packet. ...
For example, there is work on different management protocols for ad hoc management (ANMP), and work on making ad hoc networks fault tolerant. ...
doi:10.1007/3-540-36257-6_1
fatcat:pfj5sa4ahzbv3gso3ex4ajerl4
Personal Privacy in Mobile Networks
[chapter]
2011
Mobile Technologies for Conflict Management
It finally presents several solutions for the protection of location privacy in different setting and mobile networks. ...
This scenario results in a renewed interest in solutions for protecting the privacy of mobile users, especially in those environments where lack of protection may result in persecution, political violence ...
Capkun et al. provide a scheme for secure and privacypreserving communications in hybrid ad-hoc networks (Capkun et al. 2004) . ...
doi:10.1007/978-94-007-1384-0_14
fatcat:d77oitt6xrg3jcqexrcvfesadi
Distributed SIP conference management with autonomously authenticated sources and its application to an H.264 videoconferencing software for mobiles
2010
Multimedia tools and applications
We describe the essential building blocks for conference management and media distribution that are necessary for a distributed conferencing approach. ...
The design of conferencing systems for achieving efficient and flexible communication in a fully distributed, infrastructure-independent fashion is a promising direction, both in terms of research and ...
This paper deals with the question how to enable infrastructure-agnostic ad hoc videoconferencing in a standard-compliant and secure manner by involving both standard PCs and mobile devices. ...
doi:10.1007/s11042-010-0500-8
fatcat:7cqg25go5baqnimas2gt2dkz3u
Efficient Multilevel Privacy Preserving Authentication Scheme for Emergency Message Communication in VANE
2018
International Journal of Engineering & Technology
Vehicular ad hoc networks (VANETs) provide spontaneous traffic related and emergency rescue messages to its users of the route thereby enable them with the trouble-free driving. ...
In the proposed scheme the TA provides a long term Verification signature which is mandatory to all the vehicles that are registered under VANET and this signature is also necessary in receiving the secondary ...
Vehicular ad-hoc network provides an ideal transportation system to the world. It is one of the secondary divisions of mobile ad-hoc network. ...
doi:10.14419/ijet.v7i3.6.14973
fatcat:wwvonwcor5abjpfb2dh33u55uu
« Previous
Showing results 1 — 15 out of 2,515 results