Okorafor et al., 2010 - Google Patents
Security-aware routing and localization for a directional mission critical networkOkorafor et al., 2010
View PDF- Document ID
- 2368955768413234408
- Author
- Okorafor U
- Kundur D
- Publication year
- Publication venue
- IEEE Journal on Selected Areas in Communications
External Links
Snippet
There has been recent interest in the development of untethered sensor nodes that communicate directionally via free space optical communications for mission critical settings in which high-speed link guarantees in hostile environments are needed. Directional …
- 230000004807 localization 0 title abstract description 28
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
- H04W84/20—Master-slave selection or change arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/22—Alternate routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/04—Interdomain routing, e.g. hierarchical routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
- H04L12/46—Interconnection of networks
- H04L12/4637—Interconnected ring systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/005—Moving wireless networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/34—Modification of an existing route
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
- H04L12/42—Loop networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/35—Application specific switches
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khabbazian et al. | Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks | |
El Defrawy et al. | Privacy-preserving location-based on-demand routing in MANETs | |
Lazos et al. | Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach | |
Poovendran et al. | A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks | |
Rani et al. | A survey of security in wireless sensor networks | |
Saxena | Security in wireless sensor networks-a layer based classification | |
Singh et al. | Security for wireless sensor network | |
Chen et al. | An efficient anonymous communication protocol for wireless sensor networks | |
Jeba et al. | False data injection attack and its countermeasures in wireless sensor networks | |
Mezrag et al. | Secure routing in cluster-based wireless sensor networks | |
Zhang et al. | Security issues in wireless mesh networks | |
Bharamagoudra et al. | Agent‐based secure routing for underwater acoustic sensor networks | |
Kumar et al. | A secure localization approach using mutual authentication and insider node validation in wireless sensor networks | |
Verma | A cluster based key management scheme for underwater wireless sensor networks | |
Jeba et al. | An evaluation of en-route filtering schemes on wireless sensor networks | |
Okorafor et al. | Security-aware routing and localization for a directional mission critical network | |
Haas et al. | Current challenges and approaches in securing communications for sensors and actuators | |
Zhang et al. | Security in wireless sensor networks: A survey | |
Singh et al. | Survey of secure routing protocols in MANET | |
Salem et al. | A DOS attack intrusion detection and inhibition technique for wireless computer networks | |
Garg et al. | Comprehensive study on MANETs network layer attacks | |
Ouafaa et al. | Review on the attacks and security protocols for wireless sensor networks | |
Udhayakumar et al. | Security attacks and detection techniques for MANET | |
Madhumitha et al. | A Survey on Anonymous Routing Protocols in Mobile Ad hoc Networks | |
Okorafor et al. | A secure integrated routing and localization scheme for broadband mission critical networks |