Authentication Mechanism for Ad Hoc Wireless Local Area Network
Wireless networks have grown rapidly over the last decade and they have been deployed in numerous applications due to their advantages over wired networks, specifically for its mobility and convenience. However, due to its wireless nature, some security issues in wireless network need to be addre...
| Main Authors: | M.A.C., Bhakti, Azween, Abdullah |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/2699/ http://scholars.utp.edu.my/id/eprint/2699/1/Thesis_Final.pdf |
Similar Items
EAP Authentication Mechanism for Ad Hoc Wireless LAN
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
EAP-BASED AUTHENTICATION FOR AD HOC NETWORK
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
EAP authentication mechanism for Ad Hoc wireless LAN
by: M. Agni Catur Bhakti,, et al.
Published: (2008)
by: M. Agni Catur Bhakti,, et al.
Published: (2008)
Formal Specification Language for Vehicular Ad-Hoc Networks
by: Maythem Kamal , Abbas, et al.
Published: (2009)
by: Maythem Kamal , Abbas, et al.
Published: (2009)
Securing Mobile Ad hoc Domain by Immune-Inspired Mechanism
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Biologically Inspired Model for Securing Mobile Ad Hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Novel Immune-based Framework for Securing Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
EAP-based Authentication with EAP Method Selection Mechanism
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
Congestive Loss in Wireless Ad hoc Network: Network Performance Analysis
by: Nahar, H., et al.
Published: (2011)
by: Nahar, H., et al.
Published: (2011)
Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Biologically inspired architecture for securing hybrid mobile ad hoc networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
EAP-based Authentication with EAP Method Selection Mechanism: Simulation Design
by: M.A.C., Bhakti, et al.
Published: (2007)
by: M.A.C., Bhakti, et al.
Published: (2007)
An alternative routing mechanisms for mobile ad-hoc networks
by: Ali, Awos Khazal
Published: (2008)
by: Ali, Awos Khazal
Published: (2008)
WAIN: Wireless Ad Hoc in Infrastructure Network
by: Yogeswari, Muthusamy, et al.
Published: (2008)
by: Yogeswari, Muthusamy, et al.
Published: (2008)
Implementation and performance analysis of wireless Ad-hoc Mesh networks
by: Mok, Thomas Shao Chung
Published: (2024)
by: Mok, Thomas Shao Chung
Published: (2024)
Resource Aware Application for Mobile Device In An Ad Hoc Wireless Network Environment
by: Saaya, Zurina, et al.
Published: (2010)
by: Saaya, Zurina, et al.
Published: (2010)
A friend mechanism for mobile ad hoc networks
by: Abd. Razak, Shukor, et al.
Published: (2008)
by: Abd. Razak, Shukor, et al.
Published: (2008)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Mobile ad hoc network (MANET) performance through authentication approach by enhancing distributed trust model
by: Roslan, Irda
Published: (2007)
by: Roslan, Irda
Published: (2007)
A lightweight identity-based Rivest-Shamir-Adleman authentication scheme for mobile ad hoc networks
by: Eissa, Tameem
Published: (2011)
by: Eissa, Tameem
Published: (2011)
Adaptive and fuzzy approaches for nodes affinity management in wireless ad-hoc networks
by: Natsheh, Essam, et al.
Published: (2008)
by: Natsheh, Essam, et al.
Published: (2008)
The Effect Of Using XCAST Based Routing Protocol in Wireless Ad Hoc Networks.
by: Alzyoud, Faisal Y., et al.
Published: (2009)
by: Alzyoud, Faisal Y., et al.
Published: (2009)
Critical applications in vehicular ad hoc/sensor networks
by: Kumar, Neeraj, et al.
Published: (2014)
by: Kumar, Neeraj, et al.
Published: (2014)
Integrating mobile ad hoc network into mobile IPv6 network
by: Ali, Adel, et al.
Published: (2004)
by: Ali, Adel, et al.
Published: (2004)
Predicting the survivability of links in an ad hoc network / Lim Vivi
by: Lim , Vivi
Published: (2006)
by: Lim , Vivi
Published: (2006)
Video performance over ad hoc wireless local area network
by: Tan, Chong Eng
Published: (1999)
by: Tan, Chong Eng
Published: (1999)
Ad Hoc Wireless Routing With Density Based Probabilistic Algorithm For Mobile Wireless Networks With Non-Uniform Node Distribution
by: Ong , Hean Loong
Published: (2010)
by: Ong , Hean Loong
Published: (2010)
Designing an efficient DMCIS with wireless sensor and ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Mobile ad hoc network overview
by: Ismail, Ishak, et al.
Published: (2007)
by: Ismail, Ishak, et al.
Published: (2007)
Towards developing smart environment using wireless sensor and ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
A review current routing attacks in mobile ad-hoc networks
by: Khokhar, Rasheed Hafeez, et al.
Published: (2008)
by: Khokhar, Rasheed Hafeez, et al.
Published: (2008)
A framework for providing e-services to the rural areas using wireless ad hoc and sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
A lightweight secure authentication for vehicular ad-hoc networks by message encapsulation and trusted authority dependency-less scheme / Tarak Nandy
by: Tarak , Nandy
Published: (2022)
by: Tarak , Nandy
Published: (2022)
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
by: Abdulsaheb, Ghaida Muttasher
Published: (2017)
by: Abdulsaheb, Ghaida Muttasher
Published: (2017)
Simulation of EAP Method Selection and Negotiation Mechanism
by: M.A.C., Bhakti, et al.
Published: (2008)
by: M.A.C., Bhakti, et al.
Published: (2008)
Traffic analysis for QoS provisioning in Bluetooth ad hoc network
by: H., Hasbullah, et al.
Published: (2008)
by: H., Hasbullah, et al.
Published: (2008)
Implementation issues of vehicular ad hoc network applications: selected case studies in Malaysia
by: Muhammed Yusof, Zulkefli, et al.
Published: (2013)
by: Muhammed Yusof, Zulkefli, et al.
Published: (2013)
Similar Items
-
EAP Authentication Mechanism for Ad Hoc Wireless LAN
by: M.A.C., Bhakti, et al.
Published: (2010) -
EAP-BASED AUTHENTICATION FOR AD HOC NETWORK
by: M.A.C., Bhakti, et al.
Published: (2007) -
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009) -
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009) -
EAP authentication mechanism for Ad Hoc wireless LAN
by: M. Agni Catur Bhakti,, et al.
Published: (2008)