Nothing Special   »   [go: up one dir, main page]

Kauser et al., 2016 - Google Patents

Manet: Services, parameters, applications, attacks & challenges

Kauser et al., 2016

View PDF
Document ID
5943783284413010119
Author
Kauser S
Kumar P
Publication year
Publication venue
International Journal of Scientific Research in Science, Engineering and Technology, volumw2, page (s)

External Links

Snippet

Ad-hoc networks are the collection of autonomous nodes where all the nodes are configured dynamically without any centralized management system. Mobile Ad-hoc Networks (MANETs) are self-configuring network of mobile routers connected via a wireless link. A …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02BINDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
    • Y02B60/00Information and communication technologies [ICT] aiming at the reduction of own energy use
    • Y02B60/50Techniques for reducing energy-consumption in wireless communication networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/246Connectivity information discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/32Connectivity information management, e.g. connectivity discovery or connectivity update for defining a routing cluster membership
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0212Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
    • H04W52/0216Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave using a pre-established activity schedule, e.g. traffic indication frame
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/06Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing

Similar Documents

Publication Publication Date Title
Singh et al. A survey on network security and attack defense mechanism for wireless sensor networks
Joshi Security issues in routing protocols in MANETs at network layer
Kocher et al. Threat models and security issues in wireless sensor networks
Manikandan et al. A survey on attacks and defense metrics of routing mechanism in mobile ad hoc networks
Ranjan et al. Security issues of black hole attacks in MANET
Abidin et al. On confidentiality, integrity, authenticity, and Freshness (CIAF) in WSN
Kumar Singh et al. An analysis of Security Attacks found in Mobile Ad-hoc Network.
Sharma et al. Analysis of security protocols in wireless sensor network
Goyal et al. Review paper on security issues in mobile adhoc networks
Singh et al. An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks(MANET)
Kumar et al. Security Aspects in Mobile Ad Hoc Network(MANETs): Technical Review
Umar et al. SeCRoP: secure cluster head centered multi‐hop routing protocol for mobile ad hoc networks
Shrivastava et al. A brief introduction of different type of security attacks found in mobile ad-hoc network
Kaur et al. A review on security attacks in mobile ad-hoc networks
Gulia et al. Review and Analysis of the Security Issues in MANET
Kauser et al. Manet: Services, parameters, applications, attacks & challenges
Modirkhazeni et al. Empirical Study on Secure Routing Protocols in Wireless Sensor Networks.
Bartoli et al. Advanced security taxonomy for machine-to-machine (M2M) communications in 5G capillary networks
Udhayakumar et al. Security attacks and detection techniques for MANET
Puri et al. Dynamic high level cross layer security mechanisms for wireless sensor networks
Sharma et al. Security mechanisms for mitigating multiple black hole attack in Manets
Mary et al. A Study on MANET and its Security Concepts
Panaousis et al. Securing ad hoc networks in extreme emergency cases
Sharma A Review of Vulnerabilities and Attacks in Mobile Ad-Hoc Network
Noureldien et al. Survey of mobile ad hoc networks attacks and a new classification scheme