Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the ...
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
— Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for diffe...
Amir R. Khakpour, Maryline Laurent-Maknavicius, Ha...
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...