The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Security in Ad-Hoc Networks
|
Author(s): Muhammad Mahmudul Islam (Monash University, Clayton, Australia), Ronald Pose (Monash University, Clayton, Australia)and Carlo Kopp (Monash University, Clayton, Australia)
Copyright: 2008
Pages: 30
Source title:
Mobile Multimedia Communications: Concepts, Applications, and Challenges
Source Author(s)/Editor(s): Gour Karmakar (Monash University, Australia)and Laurence S. Dooley (Monash University, Australia)
DOI: 10.4018/978-1-59140-766-9.ch013
Purchase
|
Abstract
Due to the nature of wireless media, dynamic network topology, resource constraints, and lack of any base station or access point, security in ad-hoc networks is more challenging than with cabled networks. In this chapter, we discuss various attacks on the network layer of ad-hoc networks. We also review security protocols that protect network layer operations from various attacks.
Related Content
Nithin Kalorth, Vidya Deshpande.
© 2024.
7 pages.
|
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane.
© 2024.
24 pages.
|
T.S. Sujith.
© 2024.
13 pages.
|
C. Suganya, M. Vijayakumar.
© 2024.
11 pages.
|
B. Harry, Vijayakumar Muthusamy.
© 2024.
19 pages.
|
Munise Hayrun Sağlam, Ibrahim Kirçova.
© 2024.
19 pages.
|
Elif Karakoç Keskin.
© 2024.
19 pages.
|
|
|