[go: up one dir, main page]

Sharma, 2010 - Google Patents

ANALYSIS OF SECURITY REQUIREMENTS IN WIRELESS NETWORKS AND MOBILE AD-HOC NETWORKS.

Sharma, 2010

View PDF
Document ID
7090949065992833897
Author
Sharma N
Publication year
Publication venue
Computer Science & Telecommunications

External Links

Snippet

The Wireless standard for LAN (802.11) gives the description of the access method, modulation, and authentication schemes and protocols to be followed. These standards face many challenges in the Mobile Ad-Hoc Network environment because of the constant node …
Continue reading at scholar.archive.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/04Key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W76/00Connection management, e.g. connection set-up, manipulation or release
    • H04W76/02Connection set-up
    • H04W76/023Direct mode set-up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W8/00Network data management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks

Similar Documents

Publication Publication Date Title
Lyu et al. Selective authentication based geographic opportunistic routing in wireless sensor networks for Internet of Things against DoS attacks
Obi Security issues in mobile ad-hoc networks: a survey
Pervaiz et al. Routing security in ad hoc wireless networks
Alanazi et al. On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications
Lacuesta et al. Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Patwardhan et al. Threshold-based intrusion detection in ad hoc networks and secure AODV
Ramezan et al. A survey of secure routing protocols in multi-hop cellular networks
Moamen et al. Secure multicast routing protocols in mobile ad‐hoc networks
Sharma et al. Security issues and their solutions in MANET
Yao et al. A-CACHE: An anchor-based public key caching scheme in large wireless networks
Thandava Meganathan et al. Privacy preserved and secured reliable routing protocol for wireless mesh networks
CN117336183A (en) Broadband ad hoc network communication system based on cryptographic algorithm
Rathee et al. Security concerns with open research issues of present computer network
Navmani et al. Trust based secure reliable route discovery in wireless mesh networks
Sharma ANALYSIS OF SECURITY REQUIREMENTS IN WIRELESS NETWORKS AND MOBILE AD-HOC NETWORKS.
Nácher et al. An overview of anonymous communications in mobile ad hoc networks
Panday et al. A Review on security Issues of AODV routing protocol for MANETs
He et al. S-MAODV: A trust key computing based secure Multicast Ad-hoc On Demand Vector routing protocol
Nguyan et al. Security routing analysis for mobile ad hoc networks
Mahajan et al. Trust based routing for secure wireless networking solutions
Koul et al. Quality of Service Oriented Secure Routing Model for Mobile Ad hoc Networks
Raja et al. Dual authentication hashing for security enhancement in MANET
Kamboj et al. A Comparative Study of various Secure Routing Protocols based on AODV
Khubalkar et al. Security enabled DSR for establishing symmetric key and security in MANETS
Vinayagam et al. Cross-layered-based adaptive secured routing and data transmission in MANET