Sharma, 2010 - Google Patents
ANALYSIS OF SECURITY REQUIREMENTS IN WIRELESS NETWORKS AND MOBILE AD-HOC NETWORKS.Sharma, 2010
View PDF- Document ID
- 7090949065992833897
- Author
- Sharma N
- Publication year
- Publication venue
- Computer Science & Telecommunications
External Links
Snippet
The Wireless standard for LAN (802.11) gives the description of the access method, modulation, and authentication schemes and protocols to be followed. These standards face many challenges in the Mobile Ad-Hoc Network environment because of the constant node …
- 238000004458 analytical method 0 title description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/04—Key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W76/00—Connection management, e.g. connection set-up, manipulation or release
- H04W76/02—Connection set-up
- H04W76/023—Direct mode set-up
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lyu et al. | Selective authentication based geographic opportunistic routing in wireless sensor networks for Internet of Things against DoS attacks | |
| Obi | Security issues in mobile ad-hoc networks: a survey | |
| Pervaiz et al. | Routing security in ad hoc wireless networks | |
| Alanazi et al. | On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications | |
| Lacuesta et al. | Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks | |
| Patwardhan et al. | Threshold-based intrusion detection in ad hoc networks and secure AODV | |
| Ramezan et al. | A survey of secure routing protocols in multi-hop cellular networks | |
| Moamen et al. | Secure multicast routing protocols in mobile ad‐hoc networks | |
| Sharma et al. | Security issues and their solutions in MANET | |
| Yao et al. | A-CACHE: An anchor-based public key caching scheme in large wireless networks | |
| Thandava Meganathan et al. | Privacy preserved and secured reliable routing protocol for wireless mesh networks | |
| CN117336183A (en) | Broadband ad hoc network communication system based on cryptographic algorithm | |
| Rathee et al. | Security concerns with open research issues of present computer network | |
| Navmani et al. | Trust based secure reliable route discovery in wireless mesh networks | |
| Sharma | ANALYSIS OF SECURITY REQUIREMENTS IN WIRELESS NETWORKS AND MOBILE AD-HOC NETWORKS. | |
| Nácher et al. | An overview of anonymous communications in mobile ad hoc networks | |
| Panday et al. | A Review on security Issues of AODV routing protocol for MANETs | |
| He et al. | S-MAODV: A trust key computing based secure Multicast Ad-hoc On Demand Vector routing protocol | |
| Nguyan et al. | Security routing analysis for mobile ad hoc networks | |
| Mahajan et al. | Trust based routing for secure wireless networking solutions | |
| Koul et al. | Quality of Service Oriented Secure Routing Model for Mobile Ad hoc Networks | |
| Raja et al. | Dual authentication hashing for security enhancement in MANET | |
| Kamboj et al. | A Comparative Study of various Secure Routing Protocols based on AODV | |
| Khubalkar et al. | Security enabled DSR for establishing symmetric key and security in MANETS | |
| Vinayagam et al. | Cross-layered-based adaptive secured routing and data transmission in MANET |