Security of self-organizing networks: MANET, WSN, WMN, VANET
Reflecting cutting-edge advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical secu...
| Other Authors: | Pathan, Al-Sakib Khan |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Auerbach Publications, CRC Press, Taylor & Francis Group
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/584/ http://irep.iium.edu.my/584/1/Book.pdf |
Similar Items
A survey on MANETs: architecture, evolution, applications,
security issues and solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
Malicious behaviour of node and its significant security techniques in MANET- a review
by: Khan, Burhan ul Islam, et al.
Published: (2013)
by: Khan, Burhan ul Islam, et al.
Published: (2013)
Performance evaluation in MANETs environment
by: Qabajeh, Mohammad M., et al.
Published: (2012)
by: Qabajeh, Mohammad M., et al.
Published: (2012)
Quality of Service (QOS) issues in manets
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
Major works on the necessity and implementations of PKC in WSN: a beginner’s note
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
A performance comparison of proactive and reactive routing protocols of Mobile Ad-hoc Network (MANET)
by: Azad, Saiful, et al.
Published: (2007)
by: Azad, Saiful, et al.
Published: (2007)
Performance Enhancement of NEMO based VANET using localization Router (LR) to reduce handoff delays
by: Rahman, Shaikh Mohammad Ehsanur, et al.
Published: (2017)
by: Rahman, Shaikh Mohammad Ehsanur, et al.
Published: (2017)
Evaluation Of Routing Protocols In Vanets
by: Chan, Wai Foo
Published: (2009)
by: Chan, Wai Foo
Published: (2009)
Review paper of gateway selection schemes for MANET of NEMO (MANEMO)
by: Mahmood, Zainab S., et al.
Published: (2013)
by: Mahmood, Zainab S., et al.
Published: (2013)
Self-organizing spectrum allocation (SON-SA) scheme for heterogeneous network
by: Hasan, Mohammad Kamrul, et al.
Published: (2014)
by: Hasan, Mohammad Kamrul, et al.
Published: (2014)
Self-organized HGBBDSA approach for the power allocation in OFDMA-based heterogeneous network
by: Mohammad Kamrul, Hasan, et al.
Published: (2016)
by: Mohammad Kamrul, Hasan, et al.
Published: (2016)
Effect of 3 key factors on average end to end delay and jitter in MANET
by: Hakak, Saqib Iqbal, et al.
Published: (2014)
by: Hakak, Saqib Iqbal, et al.
Published: (2014)
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
A noble approach of ACO algorithm for WSN
by: Sharmin, Afsah, et al.
Published: (2018)
by: Sharmin, Afsah, et al.
Published: (2018)
Testbed on MANET (ToM): private testbed
facility for MANET Experiment
by: Muchtar, Farkhana, et al.
Published: (2019)
by: Muchtar, Farkhana, et al.
Published: (2019)
Self-organizing joint sensing and power allocation scheme (SJSPA) to coordinate cross-tier interference for LTE-A heterogeneous networks
by: Hasan, Mohammad Kamrul, et al.
Published: (2014)
by: Hasan, Mohammad Kamrul, et al.
Published: (2014)
Evaluating the IEEE 802.15.4a UWB physical layer for WSN applications
by: Saadon, Eddy Irwan Shah
Published: (2013)
by: Saadon, Eddy Irwan Shah
Published: (2013)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
Optimal throughput and self-adaptability of robust real-time IEEE 802.15.4 MAC for AMI Mesh network
by: Shabani, Hikma, et al.
Published: (2013)
by: Shabani, Hikma, et al.
Published: (2013)
Optimal throughput and self-adaptability of robust real-time IEEE 802.15.4 MAC for AMI Mesh network
by: Shabani, Hikma, et al.
Published: (2013)
by: Shabani, Hikma, et al.
Published: (2013)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Performance evaluation of AODV ,OLSR, and GRP for
transmitting video conferencing over MANETs
by: Ahmed, Diaa Eldin Mustafa, et al.
Published: (2020)
by: Ahmed, Diaa Eldin Mustafa, et al.
Published: (2020)
Survey on mobile and wireless security awareness: user perspectives
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Secure scheme for user authentication and authorization in android environment
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Wireless physical layer security using channel state information
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
A grouping scheme for secure multicasting in mobile IPv6
by: AI-Talib, Sahar, et al.
Published: (2003)
by: AI-Talib, Sahar, et al.
Published: (2003)
Wireless physical layer security using encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009)
by: Qadir, Sana, et al.
Published: (2009)
Incorporation of QoS in network mobility (NEMO) network
by: Hussien, Loay Faisal, et al.
Published: (2013)
by: Hussien, Loay Faisal, et al.
Published: (2013)
Issues in location-based multicast routing in manets
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2014)
by: Tahir, Mohammad, et al.
Published: (2014)
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019)
by: Hasan, Ahmed Raheem
Published: (2019)
Mobility support in MPLS network
by: Mahmoud, Omer, et al.
Published: (2011)
by: Mahmoud, Omer, et al.
Published: (2011)
Simulation in wireless networks: an overview
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
Evaluation methods in computer networking
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Recovery modeling in MPLS networks
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2006)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2006)
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009)
by: Islam, Md. Rafiqul, et al.
Published: (2009)
Time-delay neural network for rainfall forecasting
by: Htike, Kyaw Kyaw, et al.
Published: (2011)
by: Htike, Kyaw Kyaw, et al.
Published: (2011)
Routing protocols for ad hoc wireless networks
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
Power control for interference avoidance in femtocell network
by: Al-Hmoudi, Mutieb, et al.
Published: (2011)
by: Al-Hmoudi, Mutieb, et al.
Published: (2011)
Similar Items
-
A survey on MANETs: architecture, evolution, applications,
security issues and solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2018) -
Malicious behaviour of node and its significant security techniques in MANET- a review
by: Khan, Burhan ul Islam, et al.
Published: (2013) -
Performance evaluation in MANETs environment
by: Qabajeh, Mohammad M., et al.
Published: (2012) -
Quality of Service (QOS) issues in manets
by: Qabajeh, Mohammad M., et al.
Published: (2011) -
Major works on the necessity and implementations of PKC in WSN: a beginner’s note
by: Pathan, Al-Sakib Khan
Published: (2011)