منابع مشابه
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks
In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...
متن کاملAd hoc networks security
Countermeasures against node misbehavior and selfishness are mandatory requirements in mobile ad hoc networks. Selfishness that causes lack of node activity cannot be solved by classical security means that aim at verifying the correctness and integrity of an operation. In this paper we outline an original security mechanism (CORE) based on reputation that is used to enforce cooperation among t...
متن کاملSecurity in Ad Hoc Networks
This paper analyzes security challenges in ad hoc networks and summarizes key issues that should be solved for achieving the ad hoc security. It also gives an overview of the current state of solutions on such key issues as intrusion detection, secure routing and key management service. Based on our study, we present using external CA (Certificate Authority) and tamperresistant chip to support ...
متن کاملSecurity in Ad Hoc Networks
In wirelesss ad hoc networks basic network operations are carried out through the cooperation of all available nodes. Due to the inherent lack of a managed infrastructure the nodes of an ad hoc network cannot be considered as trustworthy as in a dedicated infrastructure. Wireless ad hoc networks are thus vulnerable to various exposures threatening the basic network operations like routing and p...
متن کاملSecurity within Ad hoc Networks
With the advancement in radio technologies like Bluetooth, IEEE 802.11 or Hiperlan, a new concept of networking has emerged. This is known as ad hoc networking where potential mobile users arrive within the common perimeter of radio link and participate in setting up the network topology for communication. Nodes within ad hoc are mobile and they communicate with each other within radio range th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research in Engineering and Technology
سال: 2013
ISSN: 2321-7308,2319-1163
DOI: 10.15623/ijret.2013.0214020