ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A cluster based security model for mobile ad hoc networks
2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005.
◽
10.1109/icpwc.2005.1431377
◽
2005
◽
Author(s):
J. Chandra
◽
L.L. Singh
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Model
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
Trust Based Security Model to Withstand Against Black Hole and Grey Hole Attacks In Military Based Mobile Ad Hoc Networks
International Journal of Mobile Network Communications & Telematics
◽
10.5121/ijmnct.2016.6101
◽
2016
◽
Vol 6
(1)
◽
pp. 1-14
◽
Cited By ~ 1
Author(s):
Sivagurunathan S
◽
Prathapchandran K
Keyword(s):
Black Hole
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Model
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks
KSII Transactions on Internet and Information Systems
◽
10.3837/tiis.2015.11.025
◽
2015
◽
Vol 9
(11)
◽
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Model
◽
Model Based
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Route Request
Download Full-text
A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study
IEEE Transactions on Vehicular Technology
◽
10.1109/tvt.2008.923666
◽
2009
◽
Vol 58
(1)
◽
pp. 398-408
◽
Cited By ~ 29
Author(s):
Bo Rong
◽
Hsiao-Hwa Chen
◽
Yi Qian
◽
Kejie Lu
◽
Rose Qingyang Hu
◽
...
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Key Management
◽
Large Scale
◽
Ad Hoc
◽
Security Model
◽
Management Study
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Security model for routing attacks in mobile ad hoc networks
2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484)
◽
10.1109/vetecf.2003.1285399
◽
2003
◽
Cited By ~ 5
Author(s):
S.P. Alampalayam
◽
A. Kumar
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Model
◽
Routing Attacks
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Security model based mobile agent for mobile ad hoc networks
International Journal of Communication Networks and Distributed Systems
◽
10.1504/ijcnds.2019.096525
◽
2019
◽
Vol 22
(1)
◽
pp. 36
Author(s):
Maqbol Ahmed
◽
Kazar Okba
◽
Barkat Abdelbasset
◽
Bali Mouadh
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Mobile Agent
◽
Ad Hoc
◽
Security Model
◽
Model Based
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
NIS01-3: Key Management for Pyramidal Security Model of Multicast Communication in Mobile Ad Hoc Networks
IEEE Globecom 2006
◽
10.1109/glocom.2006.263
◽
2006
◽
Author(s):
Bo Rong
◽
Yi Qian
◽
Rose Qingyang Hu
◽
Sghaier Guizani
◽
Michel Kadoch
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Key Management
◽
Ad Hoc
◽
Security Model
◽
Multicast Communication
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
An Adaptive and Predictive Security Model for Mobile Ad hoc Networks
Wireless Personal Communications
◽
10.1023/b:wire.0000047074.61412.d8
◽
2004
◽
Vol 29
(3/4)
◽
pp. 263-281
◽
Cited By ~ 10
Author(s):
Sathishkumar Alampalayam
◽
Anup Kumar
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Model
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Security model based mobile agent for mobile ad hoc networks
International Journal of Communication Networks and Distributed Systems
◽
10.1504/ijcnds.2019.10016923
◽
2019
◽
Vol 22
(1)
◽
pp. 36
Author(s):
Barkat Abdelbasset
◽
Kazar Okba
◽
Maqbol Ahmed
◽
Bali Mouadh
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Mobile Agent
◽
Ad Hoc
◽
Security Model
◽
Model Based
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Novel Source Based Min-Max Battery Cost Routing Protocol for Mobile Ad Hoc Networks
CVR Journal of Science & Technology
◽
10.32377/cvrjst0408
◽
2013
◽
Vol 4
(1)
◽
pp. 41-44
Author(s):
Humaira Nishat
◽
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Routing Protocol
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Challenges in Mobile Ad Hoc Networks: Security Threats and its Solutions
Indian Journal Of Applied Research
◽
10.15373/2249555x/jan2013/29
◽
2011
◽
Vol 3
(1)
◽
pp. 72-74
Author(s):
Dhara N Darji
◽
◽
Nita B Thakkar
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Threats
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close