A survey of security issues in mobile ad hoc and sensor networks
- 1 January 2005
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Communications Surveys & Tutorials
- Vol. 7 (4), 2-28
- https://doi.org/10.1109/comst.2005.1593277
Abstract
No abstract availableThis publication has 61 references indexed in Scilit:
- Simulation performance evaluation of an energy efficient routing protocol for mobile ad hoe networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Secure data transmission in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2003
- Rushing attacks and defense in wireless ad hoc network routing protocolsPublished by Association for Computing Machinery (ACM) ,2003
- An on-demand secure routing protocol resilient to byzantine failuresPublished by Association for Computing Machinery (ACM) ,2002
- Securing ad hoc routing protocolsPublished by Association for Computing Machinery (ACM) ,2002
- Self-organized network-layer security in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2002
- Performance analysis of the CONFIDANT protocolPublished by Association for Computing Machinery (ACM) ,2002
- Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc NetworksPublished by Springer Science and Business Media LLC ,2002
- Security-aware ad hoc routing for wireless networksPublished by Association for Computing Machinery (ACM) ,2001
- How to share a secretCommunications of the ACM, 1979