Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

Security evaluation of a wireless ad-hoc network with dynamic topology

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

This article reviews the approach to security evaluation of wireless ad-hoc networks (mesh networks, MANET/VANET networks, networks of smart houses, etc.), which is based on the method of principal component analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Minin, A. and Kalinin, M., Information security in computer networks with dynamic topology. Proceedings of the 8th International Conference on Security of Information and Networks, ACM New York, NY, USA, 2015, pp. 127–130.

    Google Scholar 

  2. Marti, S., Giuli, T.J., Baker, M.K., and Lai, K., Mitigating routing misbehavior in mobile ad hoc networks. In Proc. of the 6th Annual ACM/IEEE Intl. Conf. on Mobile Computing and Networking, 2000, p. 255–265.

    Google Scholar 

  3. Buchegger, S. and Boudec, J., Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes-Fairness In Dynamic Ad-hoc NetTworks), Proc. of the 3d ACM Intl. Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02), 2002, pp. 226–336.

    Chapter  Google Scholar 

  4. Zhang, Z., Naït-Abdesselam, F., Ho, P., and Lin X., RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks, IEEE Wireless Communications & Networking Conference, 2008, pp. 2621–2626.

    Google Scholar 

  5. Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing. Proceedings of the 9th Intl. Conf. on Security of Information and Networks (SIN). ACM New York, NY, USA, 2016, pp. 81–87.

    Google Scholar 

  6. Elgamal, T. and Hefeeda, M. Analysis of PCA Algorithms in Distributed Environments. Technical Report, arXiv:1503.05214.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. O. Kalinin.

Additional information

Original Russian Text © M.O. Kalinin, A.A. Minin, 2017, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kalinin, M.O., Minin, A.A. Security evaluation of a wireless ad-hoc network with dynamic topology. Aut. Control Comp. Sci. 51, 899–901 (2017). https://doi.org/10.3103/S0146411617080119

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411617080119

Keywords

Navigation