Mobile Ad-hoc networks security

Rehan Akbani, Turgay Korkmaz, G. V.S. Raju

Research output: Chapter in Book/Report/Conference proceedingConference contribution

47 Scopus citations

Abstract

In this paper we are focusing on closed MANETs where only authorized nodes are supposed to access the network. We denote "outsider" nodes as those nodes that are not authorized to access the network, and 'insider" nodes as those that are. The objective of this research is to develop mechanisms that protect a closed MANET against malicious behavior from outsider nodes as well as insider nodes through packet authentication and a Trust Management System, respectively.

Original languageEnglish (US)
Title of host publicationRecent Advances in Computer Science and Information Engineering
PublisherSpringer Verlag
Pages659-666
Number of pages8
EditionVOL. 4
ISBN (Print)9783642257681
DOIs
StatePublished - 2012
Event2nd World Congress on Computer Science and Information Engineering, CSIE 2011 - Changchun, China
Duration: Jun 17 2011Jun 19 2011

Publication series

NameLecture Notes in Electrical Engineering
NumberVOL. 4
Volume127 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Other

Other2nd World Congress on Computer Science and Information Engineering, CSIE 2011
Country/TerritoryChina
CityChangchun
Period6/17/116/19/11

Keywords

  • Authentication
  • MANET
  • Mobile Ad-hoc network
  • Security

ASJC Scopus subject areas

  • Industrial and Manufacturing Engineering

Fingerprint

Dive into the research topics of 'Mobile Ad-hoc networks security'. Together they form a unique fingerprint.

Cite this