Search Results

There are 64693 results for: content related to: Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model

  1. Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2442–2462, Ganesh Reddy Karri and P. Santhi Thilagam

    Version of Record online : 20 FEB 2014, DOI: 10.1002/sec.955

  2. Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks

    Security and Communication Networks

    Volume 7, Issue 8, August 2014, Pages: 1292–1309, Faraz Idris Khan, Taeshik Shon, Taekkyeun Lee and Ki-Hyung Kim

    Version of Record online : 13 MAY 2014, DOI: 10.1002/sec.1023

  3. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  4. On providing wormhole-attack-resistant localization using conflicting sets

    Wireless Communications and Mobile Computing

    Volume 15, Issue 15, 25 October 2015, Pages: 1865–1881, Honglong Chen, Wei Lou and Zhi Wang

    Version of Record online : 21 JAN 2014, DOI: 10.1002/wcm.2462

  5. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4596–4614, Mohammad Wazid, Ashok Kumar Das, Saru Kumari and Muhammad Khurram Khan

    Version of Record online : 17 OCT 2016, DOI: 10.1002/sec.1652

  6. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.915

  7. A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 376–384, Mohammad S. Obaidat, Isaac Woungang, Sanjay Kumar Dhurandher and Vincent Koo

    Version of Record online : 22 FEB 2013, DOI: 10.1002/sec.731

  8. An efficient intrusion detection framework in cluster-based wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 10, October 2013, Pages: 1211–1224, Hichem Sedjelmaci, Sidi Mohammed Senouci and Mohammed Feham

    Version of Record online : 30 JAN 2013, DOI: 10.1002/sec.687

  9. End-to-end protocol to secure ad hoc networks against wormhole attacks

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 994–1002, Sandhya Khurana and Neelima Gupta

    Version of Record online : 12 JAN 2011, DOI: 10.1002/sec.272

  10. Intrusion-aware trust model for vehicular ad hoc networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1652–1669, Riaz Ahmed Shaikh and Ahmed Saeed Alzahrani

    Version of Record online : 19 AUG 2013, DOI: 10.1002/sec.862

  11. Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2635–2645, Michael Zuba, Zhijie Shi, Zheng Peng, Jun-Hong Cui and Shengli Zhou

    Version of Record online : 8 FEB 2012, DOI: 10.1002/sec.507

  12. Topological comparison-based wormhole detection for MANET

    International Journal of Communication Systems

    Volume 27, Issue 7, July 2014, Pages: 1051–1068, King Sun Chan and Mohammad Rafiqul Alam

    Version of Record online : 25 JUL 2012, DOI: 10.1002/dac.2397

  13. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Version of Record online : 19 JUN 2012, DOI: 10.1002/sec.542

  14. Self-organizing life cycle management of mobile ad hoc networks

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1147–1158, Cándido Caballero-Gil, Pino Caballero-Gil and Jezabel Molina-Gil

    Version of Record online : 7 MAR 2012, DOI: 10.1002/sec.513

  15. Secure publish/subscribe-based certificate status validations in mobile ad hoc networks

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1063–1076, Mohammad Masdari, Sam Jabbehdari and Jamshid Bagherzadeh

    Version of Record online : 24 AUG 2014, DOI: 10.1002/sec.1062

  16. Initial conditions or emergence: What determines dissolution patterns in rough fractures?

    Journal of Geophysical Research: Solid Earth

    Volume 120, Issue 9, September 2015, Pages: 6102–6121, Virat K. Upadhyay, Piotr Szymczak and Anthony J. C. Ladd

    Version of Record online : 21 SEP 2015, DOI: 10.1002/2015JB012233

  17. Avoidance of misbehaving nodes in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1096–1114, Tal Grinshpoun, Amnon Meisels and Eyal Felstaine

    Version of Record online : 22 JUL 2013, DOI: 10.1002/sec.841

  18. Overlay tunneling as a policy tool for defending mobile ad hoc networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4482–4494, Xiruo Liu and Wade Trappe

    Version of Record online : 6 OCT 2016, DOI: 10.1002/sec.1640

  19. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  20. E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3251–3270, Monowar H. Bhuyan, D. K. Bhattacharyya and J. K. Kalita

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1530