DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/18752
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDua, Amit-
dc.date.accessioned2025-04-23T09:17:50Z-
dc.date.available2025-04-23T09:17:50Z-
dc.date.issued2017-
dc.identifier.urihttps://ieeexplore.ieee.org/document/8390045-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/18752-
dc.description.abstractIn the last few years, there has been tremendous interest in ad hoc wireless networks as they have massive military and commercial potential. An ad hoc wireless network serves as an independent network that comprises of mobile devices that utilize wireless transmission for communication, having no fixed infrastructure. These networks eliminate the complexity of infrastructure setup and hence can be deployed in quick time. However, on the negative side, such networks are very vulnerable to attacks against availability, service integrity, security, privacy and several other possible threats. To overcome these attacks, several security mechanisms have been proposed to ensure the reliability of ad hoc networks.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectComputer Scienceen_US
dc.subjectProtocolsen_US
dc.subjectAdhoc-networksen_US
dc.subjectWireless networksen_US
dc.subjectEnergy consumptionen_US
dc.subjectData analyticsen_US
dc.titleSecurity solutions against attacks in mobile ad hoc networks and their verification using BAN logicen_US
dc.typeArticleen_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.