Loading...
Search for: man-in-themiddle-attack
0.004 seconds

    Is really NACK protocol secure to be employed in MANETs?

    , Article Proceedings - 17th IEEE International Conference on Computational Science and Engineering, CSE 2014, Jointly with 13th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2014, 13th International Symposium on Pervasive Systems, Algorithms, and Networks, I-SPAN 2014 and 8th International Conference on Frontier of Computer Science and Technology, FCST 2014, 19 December 2014 through 21 December 2014 ; 2015 , Pages 1644-1647 ; 9781479979813 (ISBN) Saeed, M ; Mackvandi, A ; Taghavi, M ; Zare Bidoki, M ; Ghasemi, M ; Neshati, A ; Liu, X ; El Baz, D ; Kang, K ; Hsu, C. H ; Chen, W ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    MANET, which stands for Mobile Ad-hoc Network, is composed of a group of self-organized and wireless nodes that do not possess any predictable and fixed infrastructure. When nodes want to communicate with each other, they have to pass on their messages directly or indirectly. In case the destination node is out of the transmission range, the source node has to rely on intermediate nodes, which, in this case, is called indirect transmission. On the other hand, if the destination node is the neighboring node, there is no need to employ intermediate nodes, which, in this case, is called direct transmission. Over the past years, security issues in MANETs have received a great deal of attention...