
Please use this identifier to cite or link to this item:
http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/18752
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dua, Amit | - |
dc.date.accessioned | 2025-04-23T09:17:50Z | - |
dc.date.available | 2025-04-23T09:17:50Z | - |
dc.date.issued | 2017 | - |
dc.identifier.uri | https://ieeexplore.ieee.org/document/8390045 | - |
dc.identifier.uri | http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/18752 | - |
dc.description.abstract | In the last few years, there has been tremendous interest in ad hoc wireless networks as they have massive military and commercial potential. An ad hoc wireless network serves as an independent network that comprises of mobile devices that utilize wireless transmission for communication, having no fixed infrastructure. These networks eliminate the complexity of infrastructure setup and hence can be deployed in quick time. However, on the negative side, such networks are very vulnerable to attacks against availability, service integrity, security, privacy and several other possible threats. To overcome these attacks, several security mechanisms have been proposed to ensure the reliability of ad hoc networks. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Protocols | en_US |
dc.subject | Adhoc-networks | en_US |
dc.subject | Wireless networks | en_US |
dc.subject | Energy consumption | en_US |
dc.subject | Data analytics | en_US |
dc.title | Security solutions against attacks in mobile ad hoc networks and their verification using BAN logic | en_US |
dc.type | Article | en_US |
Appears in Collections: | Department of Computer Science and Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.