To see the other types of publications on this topic, follow the link: Security in MANET.

Dissertations / Theses on the topic 'Security in MANET'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 39 dissertations / theses for your research on the topic 'Security in MANET.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ihsan, M. "A dynamic trust and mutual authentication scheme for MANET security." Thesis, University of Salford, 2018. http://usir.salford.ac.uk/48328/.

Full text
Abstract:
MANETs are attractive technology in providing communication in the absence of a fixed infrastructure for applications such as, first responders at a disaster site or soldiers in a battlefield (Kumar, and Mishra, 2012). The rapid growth MANET has experienced in recent years is due to its Ad Hoc capabilities that have also made it prime target of cybercrimes (Jhaveri, 2012). This has raised the question of how could we embrace the benefits of MANET without the increased security risks. MANETs have several vulnerabilities such as lack of a central point, mobility, wireless links, limited energy r
APA, Harvard, Vancouver, ISO, and other styles
2

Sarwar, Yasir, and Muhammad Arshad Ali. "Security Issues regarding MANET (Mobile Ad Hoc Networks) : Challenges and Solutions." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3150.

Full text
Abstract:
Now a day, it is no longer optional to have security solutions even inevitable for every kind of organizations and individuals. There are number of generic tools which are common for organizations as well as for individual users to provide security which includes; Anti-Spam, Anti-Virus etc., and network security have become essential issue in MANET. Security is one of the main issues in the MANET especially with respect to size and complexity of the network. The aim of the thesis is to discuss different aspects of security in MANET (e.g. multi-layer intrusion detection technique in multi hop n
APA, Harvard, Vancouver, ISO, and other styles
3

Hadjichristofi, George Costa. "A Framework for Providing Redundancy and Robustness in Key Management for IPsec Security Associations in a Mobile Ad-Hoc Environment." Diss., Virginia Tech, 2005. http://hdl.handle.net/10919/28331.

Full text
Abstract:
This research investigated key management in a Mobile Ad Hoc Network (MANET) environment. At the time this research began key management schemes provided limited functionality and low service availability in a highly partitioned ad hoc environment. The purpose of this research was to develop a framework that provides redundancy and robustness for Security Association (SA) establishment between pairs of nodes. The key contribution of this research is the Key Management System (KMS) framework and, more specifically, the unique way the various components are integrated to provide the various fu
APA, Harvard, Vancouver, ISO, and other styles
4

Al-Bayatti, Ali Hilal. "Security management for mobile ad hoc network of networks (MANoN)." Thesis, De Montfort University, 2009. http://hdl.handle.net/2086/2417.

Full text
Abstract:
Mobile Ad hoc Network of Networks (MANoN) are a group of large autonomous wireless nodes communicating on a peer-to-peer basis in a heterogeneous environment with no pre-defined infrastructure. In fact, each node by itself is an ad hoc network with its own management. MANoNs are evolvable systems, which mean each ad hoc network has the ability to perform separately under its own policies and management without affecting the main system; therefore, new ad hoc networks can emerge and disconnect from the MANoN without conflicting with the policies of other networks. The unique characteristics of
APA, Harvard, Vancouver, ISO, and other styles
5

Biswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic
APA, Harvard, Vancouver, ISO, and other styles
6

Håkansson, Martin. "An evaluation of reputation spreading in mobile ad-hoc networks." Thesis, University of Skövde, School of Humanities and Informatics, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-864.

Full text
Abstract:
<p>The use of mobile ad-hoc networks (MANETs) is growing. The issue of security in MANETs is not trivial, since such networks have no fixed infrastructure and therefor centralised security is not applicable. MANETs are also more sensitive to attacks due to their wireless communication channels and their spontaneous nature.</p><p>All kind of cooperation requires a sense of trust. The opinion about trust in other entities can be used as a mean to dynamically allow for secure cooperation in MANETs, as soft security. And also to counter some of the inherited security problems of MANETs.</p><p>To u
APA, Harvard, Vancouver, ISO, and other styles
7

Serrat, Olmos Manuel David. "Cooperation techniques to improve peer-to-peer wireless networks security." Doctoral thesis, Editorial Universitat Politècnica de València, 2013. http://hdl.handle.net/10251/32831.

Full text
Abstract:
Computer networks security is a topic which has been extensively researched. This research is fully justified when one notices the dimensions of the problem faced. One can easily identify different kinds of networks, a large quantity of network protocols, and an overwhelming amount of user applications that make extensive use of networks for the purposes those applications were built. This conforms a vast research field, where it is possible for a researcher to set his or her interests over a set of threats, vulnerabilities, or types of attacks, and devise a mechanism to prevent the attack, m
APA, Harvard, Vancouver, ISO, and other styles
8

Almotiri, Sultan H. "Design and Evaluation of Security Mechanism for Routing in MANETs. Elliptic Curve Diffie-Hellman cryptography mechanism to secure Dynamic Source Routing protocol (DSR) in Mobile Ad Hoc Network (MANET)." Thesis, University of Bradford, 2013. http://hdl.handle.net/10454/5718.

Full text
Abstract:
Ensuring trustworthiness through mobile nodes is a serious issue. Indeed, securing the routing protocols in Mobile Ad Hoc Network (MANET) is of paramount importance. A key exchange cryptography technique is one such protocol. Trust relationship between mobile nodes is essential. Without it, security will be further threatened. The absence of infrastructure and a dynamic topology changing reduce the performance of security and trust in mobile networks. Current proposed security solutions cannot cope with eavesdroppers and misbehaving mobile nodes. Practically, designing a key exchange cryptogra
APA, Harvard, Vancouver, ISO, and other styles
9

Abdelhafez, Mohamed. "Modeling and Simulations of Worms and Mitigation Techniques." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19840.

Full text
Abstract:
Internet worm attacks have become increasingly more frequent and have had a major impact on the economy, making the detection and prevention of these attacks a top security concern. Several countermeasures have been proposed and evaluated in recent literature. However, the eect of these proposed defensive mechanisms on legitimate competing traffic has not been analyzed. The first contribution of this thesis is a comparative analysis of the effectiveness of several of these proposed mechanisms, including a measure of their effect on normal web browsing activities. In addition, we introduce a n
APA, Harvard, Vancouver, ISO, and other styles
10

Alam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.

Full text
Abstract:
The recent advancements in the wireless technology and their wide-spread utilization have made tremendous enhancements in productivity in the corporate and industrial sectors. However, these recent progresses have also introduced new security vulnerabilities. Since the wireless shared medium is completely exposed to outsiders, it is susceptible to attacks that could target any of the OSI layers in the network stack. For example, jamming of the physical layer, disruption of the medium access control (MAC) layer coordination packets, attacks against the routing infrastructure, targeted attacks o
APA, Harvard, Vancouver, ISO, and other styles
11

Njilla, Laurent L. Y. "Modeling Security and Resource Allocation for Mobile Multi-hop Wireless Neworks Using Game Theory." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2284.

Full text
Abstract:
This dissertation presents novel approaches to modeling and analyzing security and resource allocation in mobile ad hoc networks (MANETs). The research involves the design, implementation and simulation of different models resulting in resource sharing and security’s strengthening of the network among mobile devices. Because of the mobility, the network topology may change quickly and unpredictably over time. Moreover, data-information sent from a source to a designated destination node, which is not nearby, has to route its information with the need of intermediary mobile nodes. However, not
APA, Harvard, Vancouver, ISO, and other styles
12

CHENG, YI. "Security Mechanisms for Mobile Ad Hoc and Wireless Sensor Networks." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1212076752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Aslam, Baber. "Networking and security solutions for VANET initial deployment stage." Doctoral diss., University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5109.

Full text
Abstract:
Vehicular ad hoc network (VANET) is a special case of mobile networks, where vehicles equipped with computing/communicating devices (called "smart vehicles") are the mobile wireless nodes. However, the movement pattern of these mobile wireless nodes is no more random, as in case of mobile networks, rather it is restricted to roads and streets. Vehicular networks have hybrid architecture; it is a combination of both infrastructure and infrastructure-less architectures. The direct vehicle to vehicle (V2V) communication is infrastructure-less or ad hoc in nature. Here the vehicles traveling withi
APA, Harvard, Vancouver, ISO, and other styles
14

Hortelano, Otero Jorge. "Design and implementation of architectures for the deployment of secure community wireless networks." Doctoral thesis, Universitat Politècnica de València, 2011. http://hdl.handle.net/10251/10079.

Full text
Abstract:
Recientes avances en las tecnologías de la comunicación, así como la proliferación de nuevos dispositivos de computación, están plasmando nuestro entorno hacia un Internet ubicuo. Internet ofrece una plataforma global para acceder con bajo coste a una vasta gama de servicios de telecomunicaciones, como el correo electrónico, comercio electrónico, tele-educación, tele-salud y tele-medicina a bajo coste. Sin embargo, incluso en los países más desarrollados, un gran número de áreas rurales todavía están pobremente equipadas con una infraestructura básica de telecomunicaciones. Hoy en día, existen
APA, Harvard, Vancouver, ISO, and other styles
15

Silva, Anderson Aparecido Alves da. "Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-21032017-154023/.

Full text
Abstract:
Controles de segurança, também chamados de mecanismos de proteção, voltados para previsão e detecção de eventos indesejados são cada vez mais empregados em ambientes de Tecnologia da Informação (TI). O pouco entendimento sobre as características dos eventos indesejados que agem nos sistemas e a baixa compatibilidade existente entre os diversos mecanismos de proteção são problemas que se destacam neste tipo de cenário. Diferentes configurações dificultam a combinação dos resultados destes mecanismos e raramente dois ou mais controles de segurança se complementam. Por esse motivo, o agrupamento
APA, Harvard, Vancouver, ISO, and other styles
16

Alqallaf, Maha. "Software Defined Secure Ad Hoc Wireless Networks." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1464020851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ayachi, Mohamed Ali. "Contributions à la détection des comportements malhonnêtes dans les réseaux ad hoc AODV par analyse de la confiance implicite." Phd thesis, Université Rennes 1, 2011. http://tel.archives-ouvertes.fr/tel-00660467.

Full text
Abstract:
La constante évolution des technologies de l'information et le penchant vers l'utilisation des machines sans fil qui se sont imposées ces dernières années ont fait émerger un nouveau type de réseaux : les réseaux sans-fil ad hoc, ou MANET (Mobile Ad hoc NETwork). Se souciant de pouvoir communiquer et de partager l'information dans n'importe quelle situation, les réseaux ad hoc sont des systèmes autonomes composés par un ensemble d'entités mobiles libres de se déplacer sans contraintes. Ces entités utilisent le médium radio pour communiquer et forment un réseau n'utilisant aucune infrastructure
APA, Harvard, Vancouver, ISO, and other styles
18

Hurley-Smith, Darren. "Virtual closed networks : optimised security for autonomous MANETs." Thesis, University of Greenwich, 2015. http://gala.gre.ac.uk/20953/.

Full text
Abstract:
Autonomous mobile platforms (such as Unmanned Aerial Vehicles, also known as UAVs) have become a popular tool in exploration, disaster management, civil-engineering, agricultural and military scenarios. Their endurance, low-cost, high mobility and ability to reduce human involvement in prolonged or hazardous activities have proven attractive to both commercial and military sectors. In such domains, security is required to protect the data, functionality and performance of the network, making it a vital consideration when developing such systems. Systems capable of independent action, following
APA, Harvard, Vancouver, ISO, and other styles
19

Aldabbas, Hamza. "Securing data dissemination in vehicular ad hoc networks." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/7987.

Full text
Abstract:
Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) in which the mobile nodes are vehicles; these vehicles are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured and self-controlled infrastructure-less networks. This kind of network has the advantage of being able to be set-up and deployed anywhere and anytime because it has no infrastructure set-up and no central administration. Distributing information between these vehicles over long ranges in such networks, however, is a very challenging
APA, Harvard, Vancouver, ISO, and other styles
20

Lu, Bin. "Quality of Service (QoS) security in mobile ad hoc networks." Texas A&M University, 2005. http://hdl.handle.net/1969.1/4295.

Full text
Abstract:
With the rapid proliferation of wireless networks and mobile computing applications, Quality of Service (QoS) for mobile ad hoc networks (MANETs) has received increased attention. Security is a critical aspect of QoS provisioning in the MANET environment. Without protection from a security mechanism, attacks on QoS signaling system could result in QoS routing malfunction, interference of resource reservation, or even failure of QoS provision. Due to the characteristics of the MANETs, such as rapid topology change and limited communication and computation capacity, the conventional security mea
APA, Harvard, Vancouver, ISO, and other styles
21

Abbas, Sohail. "A layered security approach for cooperation enforcement in MANETs." Thesis, Liverpool John Moores University, 2011. http://researchonline.ljmu.ac.uk/6091/.

Full text
Abstract:
In fully self-organized MANETs, nodes are naturally reluctant to spend their precious resources forwarding other nodes' packets and are therefore liable to exhibit selfish or sometimes malicious behaviour. This selfishness could potentially lead to network partitioning and network performance degradation. Cooperation enforcement schemes, such as reputation and trust based schemes have been proposed to counteract the issue of selfishness. The sole purpose of these schemes is to ensure selfish nodes bear the consequences of their bad actions. However, malicious nodes can exploit mobility and fre
APA, Harvard, Vancouver, ISO, and other styles
22

Guerrero, Zapata Manel. "Securing and enhancing routing protocols for mobile ad hoc networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2006. http://hdl.handle.net/10803/5994.

Full text
Abstract:
1. CONTEXTO<br/><br/>1.1. MANET<br/><br/>MANET (Mobile and Ad hoc NETworks) (Redes móviles sin cables) son redes formadas por nodos móviles. Se comunican sin cables i lo hacen de manera 'ad hoc'. En este tipo de redes, los protocolos de enrutamiento tienen que ser diferentes de los utilizados en redes fijas.<br/><br/>Hoy en día, existen protocolos de enrutamiento capaces de operar en este tipo de redes. No obstante, son completamente inseguras y confían en que los nodos no actuarán de manera malintencionada. En una red donde no se puede contar con la presencia de servidores centrales, se neces
APA, Harvard, Vancouver, ISO, and other styles
23

Darwish, Salaheddin. "A simulation-based methodology for the assessment of server-based security architectures for mobile ad hoc networks (MANETs)." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/13823.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) is typically a set of wireless mobile nodes enabled to communicate dynamically in a multi-hop manner without any pre-existing network infrastructure. MANETs have several unique characteristics in contrast to other typical networks, such as dynamic topology, intermittent connectivity, limited resources, and lack of physical security. Securing MANETs is a critical issue as these are vulnerable to many different attacks and failures and have no clear line of defence. To develop effective security services in MANETs, it is important to consider an appropriate trust
APA, Harvard, Vancouver, ISO, and other styles
24

Zhang, Hang [Verfasser], Dieter [Akademischer Betreuer] Hogrefe, Dieter [Gutachter] Hogrefe, and Xiaoming [Gutachter] Fu. "A Security Aware Fuzzy Enhanced ACO Routing Protocol in MANETs / Hang Zhang ; Gutachter: Dieter Hogrefe, Xiaoming Fu ; Betreuer: Dieter Hogrefe." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2018. http://d-nb.info/1173975047/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

"Trust- and clustering-based authentication service in MANET." 2004. http://library.cuhk.edu.hk/record=b5892241.

Full text
Abstract:
Ngai Cheuk Han.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.<br>Includes bibliographical references (leaves 110-117).<br>Abstracts in English and Chinese.<br>Abstract --- p.i<br>Acknowledgement --- p.iv<br>Chapter 1 --- Introduction --- p.1<br>Chapter 2 --- Background Study --- p.5<br>Chapter 2.1 --- Mobile Ad Hoc Networks --- p.5<br>Chapter 2.1.1 --- Definition --- p.5<br>Chapter 2.1.2 --- Characteristics --- p.5<br>Chapter 2.1.3 --- Applications --- p.6<br>Chapter 2.1.4 --- Standards --- p.7<br>Chapter 2.1.5 --- Routing Protocols --- p.8<br>Chapter 2.2 --- Security i
APA, Harvard, Vancouver, ISO, and other styles
26

Vimal, S. "An energy efficient intrusion detection system in MANET for secure routing and clustering." Thesis, 2014. http://ethesis.nitrkl.ac.in/5558/1/E-THESIS_30.pdf.

Full text
Abstract:
Security is a primary concerns when protected communication between mobile nodes in a averse environment is the requirement. MANETs are more susceptible to be attacked as compared to the wired networks. These vulnerabilities are due to the operating principles of the MANET which can not be changed. Securing MANET is equally important as securing fixed wired networks. Certain level of security can be obtained form the existing solutions. However, these solutions are not always necessarily suitable for wireless networks. Several intrusion detection techniques that have been developed for fixed w
APA, Harvard, Vancouver, ISO, and other styles
27

Chen, Chih-Jui, and 陳至睿. "A Study on MANET Security Based on Hierarchy Access Control with Linear Congruence and Key Exchange." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/m9889x.

Full text
Abstract:
碩士<br>中原大學<br>電機工程研究所<br>93<br>Abstract In this thesis, we propose two authentication protocols and security schemes for MANET based on hierarchy access control, symmetric key cryptosystem, and hierarchy structure. We will make an application of our scheme on MANET security. We also make detailed security analysis about our schemes. The proposed new protocol not only at the same time offer security and authentication on MANET but also reduce systematic complexity and calculating amount. Our first proposed scheme operational complexity is based on hierarchy access control with linear congruence
APA, Harvard, Vancouver, ISO, and other styles
28

Alnaghes, Mnar Saeed. "An Approach to Defend Against Black hole Attacks in Ad Hoc Networks: Node Clustering AODV Protocol (CAODV)." Thesis, 2015. http://hdl.handle.net/1828/6753.

Full text
Abstract:
The flexibility of Mobile Ad hoc networks (MANET) and its characteristics introduce new security risks. One possible attack is the Black Hole attack which received recent attention. In the Black Hole attack, a malicious node uses the routing protocol to declare itself as having the shortest path to the node whose packets it wants to intercept. It is needed to understand this risk with a view to extract preventive and corrective protections against it. We introduce an approach that could stop this attack from happening in such a network by using an algorithm which controls the communications be
APA, Harvard, Vancouver, ISO, and other styles
29

Talawar, Shrikant. "Efficient Key Management Protocols for Secure Routing and End-to-End Key Establishment with Enhanced Security in Mobile Ad hoc Networks." Thesis, 2015. https://etd.iisc.ac.in/handle/2005/4545.

Full text
Abstract:
There is a need to protect mobile ad hoc network (MANET) from external attackers as well as internal attackers during route discovery and end-to-end key establishment. During route discovery, the external attackers can be prevented from participating in routing activities of the MANET with the help of an efficient key management protocol and cryptography. In this thesis, we propose a novel secure routing with localized key management (SR-LKM) protocol, which is aimed to prevent both internal as well as external attackers from participating in routing activities of the MANET. We make use of Pub
APA, Harvard, Vancouver, ISO, and other styles
30

Maity, Soumyadev. "Efficient Key Management, and Intrusion Detection Protocols for Enhancing Security in Mobile Ad Hoc Networks." Thesis, 2014. http://etd.iisc.ac.in/handle/2005/2795.

Full text
Abstract:
Security of communications is a major requirement for Mobile Adhoc NETworks(MANETs) since they use wireless channel for communications which can be easily tapped, and physical capture of MANET nodes is also quite easy. From the point of view of providing security in MANETs, there are basically two types of MANETs, viz., authoritarian MANETs, in which there exist one or more authorities who decide the members of the network, and self-organized MANETs, in which there is no such authority. Ensuring security of communications in the MANETs is a challenging task due to the resource constraints and
APA, Harvard, Vancouver, ISO, and other styles
31

Miskeen, Guzlan M. A., Demetres D. Kouvatsos, and Zadeh Esmaeil Habib. "An Exposition of Performance-Security Trade-offs in RANETs Based on Quantitative Network Models." 2013. http://hdl.handle.net/10454/9692.

Full text
Abstract:
No<br>Security mechanisms, such as encryption and authentication protocols, require extra computing resources and therefore, have an adverse effect upon the performance of robotic mobile wireless ad hoc networks (RANETs). Thus, an optimal performance and security trade-off should be one of the main aspects that should be taken into consideration during the design, development, tuning and upgrading of such networks. In this context, an exposition is initially undertaken on the applicability of Petri nets (PNs) and queueing networks (QNs) in conjunction with their generalisations and hybrid inte
APA, Harvard, Vancouver, ISO, and other styles
32

Maity, Soumyadev. "Efficient Key Management, and Intrusion Detection Protocols for Enhancing Security in Mobile Ad Hoc Networks." Thesis, 2014. http://etd.iisc.ernet.in/handle/2005/2795.

Full text
Abstract:
Security of communications is a major requirement for Mobile Adhoc NETworks(MANETs) since they use wireless channel for communications which can be easily tapped, and physical capture of MANET nodes is also quite easy. From the point of view of providing security in MANETs, there are basically two types of MANETs, viz., authoritarian MANETs, in which there exist one or more authorities who decide the members of the network, and self-organized MANETs, in which there is no such authority. Ensuring security of communications in the MANETs is a challenging task due to the resource constraints and
APA, Harvard, Vancouver, ISO, and other styles
33

Taheri, Somayeh. "Anonymity and Privacy in Wireless Mobile Ad Hoc Networks." Doctoral thesis, 2011. http://hdl.handle.net/11858/00-1735-0000-000D-F076-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Memarmoshrefi, Parisa. "A Bio-Inspired Autonomous Authentication Mechanism in Mobile Ad Hoc Networks." Doctoral thesis, 2012. http://hdl.handle.net/11858/00-1735-0000-000D-F078-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Zhang, Hang. "A Security Aware Fuzzy Enhanced ACO Routing Protocol in MANETs." Doctoral thesis, 2018. http://hdl.handle.net/11858/00-1735-0000-002E-E548-A.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Chu, Juwin, and 邱筑筠. "The Reserch of The Clearing Fund System In Taiwan Security Maket." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/17477239028670440414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Senapati, Sunil Kumar. "Securing Fisheye State Routing Algorithm Against Data Packet Dropping by Malicious Nodes in MANET." Thesis, 2009. http://ethesis.nitrkl.ac.in/1472/1/207CS201_CSE(IS)_MTech_Thesis_2009.pdf.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is an emerging area of research in the communication network world. As the MANET is infrastructure less, it is having dynamic nature of arbitrary network topology. So, it needs set of new networking strategies to be implemented in order to provide efficient end to end communication. These (MANET) networks have immense application in various fields like disaster management, sensor networks, battle field etc. Many routing protocols have been proposed in MANET among which Fisheye State Routing (FSR) protocol scales well in large network. Security in MANET is a very d
APA, Harvard, Vancouver, ISO, and other styles
38

Sahoo, Chandramani. "Intrusion Identification For Mobile Ad Hoc Networks." Thesis, 2008. https://etd.iisc.ac.in/handle/2005/823.

Full text
Abstract:
A Mobile Ad Hoc Network (MANETs) is a collection of wireless hosts that can be rapidly deployed as a multi hop packet radio network without the aid of any established infrastructure or centralized administration. Such networks can be used to enable next generation of battlefield applications envisioned by the military, including situation awareness systems for maneuvering war fighters, and remotely deployed unmanned microsensor networks. Ad Hoc networks can also provide solutions for civilian applications such as disaster recovery and message exchanges among safety and security personnel invol
APA, Harvard, Vancouver, ISO, and other styles
39

Sahoo, Chandramani. "Intrusion Identification For Mobile Ad Hoc Networks." Thesis, 2008. http://hdl.handle.net/2005/823.

Full text
Abstract:
A Mobile Ad Hoc Network (MANETs) is a collection of wireless hosts that can be rapidly deployed as a multi hop packet radio network without the aid of any established infrastructure or centralized administration. Such networks can be used to enable next generation of battlefield applications envisioned by the military, including situation awareness systems for maneuvering war fighters, and remotely deployed unmanned microsensor networks. Ad Hoc networks can also provide solutions for civilian applications such as disaster recovery and message exchanges among safety and security personnel invol
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!