[go: up one dir, main page]

Okorafor et al., 2010 - Google Patents

Security-aware routing and localization for a directional mission critical network

Okorafor et al., 2010

View PDF
Document ID
2368955768413234408
Author
Okorafor U
Kundur D
Publication year
Publication venue
IEEE Journal on Selected Areas in Communications

External Links

Snippet

There has been recent interest in the development of untethered sensor nodes that communicate directionally via free space optical communications for mission critical settings in which high-speed link guarantees in hostile environments are needed. Directional …
Continue reading at www.comm.toronto.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • H04W84/20Master-slave selection or change arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/04Interdomain routing, e.g. hierarchical routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
    • H04L12/46Interconnection of networks
    • H04L12/4637Interconnected ring systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/005Moving wireless networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/34Modification of an existing route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
    • H04L12/42Loop networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/35Application specific switches

Similar Documents

Publication Publication Date Title
Khabbazian et al. Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks
El Defrawy et al. Privacy-preserving location-based on-demand routing in MANETs
Lazos et al. Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
Poovendran et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
Rani et al. A survey of security in wireless sensor networks
Saxena Security in wireless sensor networks-a layer based classification
Singh et al. Security for wireless sensor network
Chen et al. An efficient anonymous communication protocol for wireless sensor networks
Jeba et al. False data injection attack and its countermeasures in wireless sensor networks
Mezrag et al. Secure routing in cluster-based wireless sensor networks
Zhang et al. Security issues in wireless mesh networks
Bharamagoudra et al. Agent‐based secure routing for underwater acoustic sensor networks
Kumar et al. A secure localization approach using mutual authentication and insider node validation in wireless sensor networks
Verma A cluster based key management scheme for underwater wireless sensor networks
Jeba et al. An evaluation of en-route filtering schemes on wireless sensor networks
Okorafor et al. Security-aware routing and localization for a directional mission critical network
Haas et al. Current challenges and approaches in securing communications for sensors and actuators
Zhang et al. Security in wireless sensor networks: A survey
Singh et al. Survey of secure routing protocols in MANET
Salem et al. A DOS attack intrusion detection and inhibition technique for wireless computer networks
Garg et al. Comprehensive study on MANETs network layer attacks
Ouafaa et al. Review on the attacks and security protocols for wireless sensor networks
Udhayakumar et al. Security attacks and detection techniques for MANET
Madhumitha et al. A Survey on Anonymous Routing Protocols in Mobile Ad hoc Networks
Okorafor et al. A secure integrated routing and localization scheme for broadband mission critical networks