Kauser et al., 2016 - Google Patents
Manet: Services, parameters, applications, attacks & challengesKauser et al., 2016
View PDF- Document ID
- 5943783284413010119
- Author
- Kauser S
- Kumar P
- Publication year
- Publication venue
- International Journal of Scientific Research in Science, Engineering and Technology, volumw2, page (s)
External Links
Snippet
Ad-hoc networks are the collection of autonomous nodes where all the nodes are configured dynamically without any centralized management system. Mobile Ad-hoc Networks (MANETs) are self-configuring network of mobile routers connected via a wireless link. A …
- 238000005516 engineering process 0 abstract description 11
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02B—INDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
- Y02B60/00—Information and communication technologies [ICT] aiming at the reduction of own energy use
- Y02B60/50—Techniques for reducing energy-consumption in wireless communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/246—Connectivity information discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/32—Connectivity information management, e.g. connectivity discovery or connectivity update for defining a routing cluster membership
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0212—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
- H04W52/0216—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave using a pre-established activity schedule, e.g. traffic indication frame
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Singh et al. | A survey on network security and attack defense mechanism for wireless sensor networks | |
Joshi | Security issues in routing protocols in MANETs at network layer | |
Kocher et al. | Threat models and security issues in wireless sensor networks | |
Manikandan et al. | A survey on attacks and defense metrics of routing mechanism in mobile ad hoc networks | |
Ranjan et al. | Security issues of black hole attacks in MANET | |
Abidin et al. | On confidentiality, integrity, authenticity, and Freshness (CIAF) in WSN | |
Kumar Singh et al. | An analysis of Security Attacks found in Mobile Ad-hoc Network. | |
Sharma et al. | Analysis of security protocols in wireless sensor network | |
Goyal et al. | Review paper on security issues in mobile adhoc networks | |
Singh et al. | An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks(MANET) | |
Kumar et al. | Security Aspects in Mobile Ad Hoc Network(MANETs): Technical Review | |
Umar et al. | SeCRoP: secure cluster head centered multi‐hop routing protocol for mobile ad hoc networks | |
Shrivastava et al. | A brief introduction of different type of security attacks found in mobile ad-hoc network | |
Kaur et al. | A review on security attacks in mobile ad-hoc networks | |
Gulia et al. | Review and Analysis of the Security Issues in MANET | |
Kauser et al. | Manet: Services, parameters, applications, attacks & challenges | |
Modirkhazeni et al. | Empirical Study on Secure Routing Protocols in Wireless Sensor Networks. | |
Bartoli et al. | Advanced security taxonomy for machine-to-machine (M2M) communications in 5G capillary networks | |
Udhayakumar et al. | Security attacks and detection techniques for MANET | |
Puri et al. | Dynamic high level cross layer security mechanisms for wireless sensor networks | |
Sharma et al. | Security mechanisms for mitigating multiple black hole attack in Manets | |
Mary et al. | A Study on MANET and its Security Concepts | |
Panaousis et al. | Securing ad hoc networks in extreme emergency cases | |
Sharma | A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network | |
Noureldien et al. | Survey of mobile ad hoc networks attacks and a new classification scheme |