Umpiring security Models for MANETS
- Autores
- Kathirvel, Ayyaswamy
- Año de publicación
- 2012
- Idioma
- inglés
- Tipo de recurso
- reseña artículo
- Estado
- versión publicada
- Descripción
- In wireless mobile ad hoc networks, packet delivery is achieved through two closely related network-layer operations: ad hoc routing and packet forwarding. As a result any security solution should encompass the protection of both. Protecting the network layer operations such as routing the control messages and data packet forwarding, from malicious attacks is an important and challenging issue in both wired and wireless mobile networks and the issue becomes even more challenging in the case of wireless mobile ad hoc network. Malicious nodes may disrupt routing algorithms by transmitting a false hop count; by dropping data packets and by routing the packets through unintended routes and so on. The work presented in this thesis attempts to improve the performance of wireless mobile ad hoc networks by protecting the network layer. Five studies are presented.
Resumen de tesis doctoral presentada por el autor.
Facultad de Informática - Materia
-
Informática
Wireless communication
Cellular architecture (e.g., mobile)
Security and Protection - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- http://creativecommons.org/licenses/by-nc/3.0/
- Repositorio
- Institución
- Universidad Nacional de La Plata
- OAI Identificador
- oai:sedici.unlp.edu.ar:10915/9713
Ver los metadatos del registro completo
id |
SEDICI_6c0de7b60da07f53265e8a5445985890 |
---|---|
oai_identifier_str |
oai:sedici.unlp.edu.ar:10915/9713 |
network_acronym_str |
SEDICI |
repository_id_str |
1329 |
network_name_str |
SEDICI (UNLP) |
spelling |
Umpiring security Models for MANETSKathirvel, AyyaswamyInformáticaWireless communicationCellular architecture (e.g., mobile)Security and ProtectionIn wireless mobile ad hoc networks, packet delivery is achieved through two closely related network-layer operations: ad hoc routing and packet forwarding. As a result any security solution should encompass the protection of both. Protecting the network layer operations such as routing the control messages and data packet forwarding, from malicious attacks is an important and challenging issue in both wired and wireless mobile networks and the issue becomes even more challenging in the case of wireless mobile ad hoc network. Malicious nodes may disrupt routing algorithms by transmitting a false hop count; by dropping data packets and by routing the packets through unintended routes and so on. The work presented in this thesis attempts to improve the performance of wireless mobile ad hoc networks by protecting the network layer. Five studies are presented.Resumen de tesis doctoral presentada por el autor.Facultad de Informática2012-04info:eu-repo/semantics/reviewinfo:eu-repo/semantics/publishedVersionRevisionhttp://purl.org/coar/resource_type/c_dcae04bcinfo:ar-repo/semantics/resenaArticuloapplication/pdf39-40http://sedici.unlp.edu.ar/handle/10915/9713enginfo:eu-repo/semantics/altIdentifier/url/http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Apr12-TO1.pdfinfo:eu-repo/semantics/altIdentifier/issn/1666-6038info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc/3.0/Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-29T10:50:48Zoai:sedici.unlp.edu.ar:10915/9713Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-29 10:50:49.053SEDICI (UNLP) - Universidad Nacional de La Platafalse |
dc.title.none.fl_str_mv |
Umpiring security Models for MANETS |
title |
Umpiring security Models for MANETS |
spellingShingle |
Umpiring security Models for MANETS Kathirvel, Ayyaswamy Informática Wireless communication Cellular architecture (e.g., mobile) Security and Protection |
title_short |
Umpiring security Models for MANETS |
title_full |
Umpiring security Models for MANETS |
title_fullStr |
Umpiring security Models for MANETS |
title_full_unstemmed |
Umpiring security Models for MANETS |
title_sort |
Umpiring security Models for MANETS |
dc.creator.none.fl_str_mv |
Kathirvel, Ayyaswamy |
author |
Kathirvel, Ayyaswamy |
author_facet |
Kathirvel, Ayyaswamy |
author_role |
author |
dc.subject.none.fl_str_mv |
Informática Wireless communication Cellular architecture (e.g., mobile) Security and Protection |
topic |
Informática Wireless communication Cellular architecture (e.g., mobile) Security and Protection |
dc.description.none.fl_txt_mv |
In wireless mobile ad hoc networks, packet delivery is achieved through two closely related network-layer operations: ad hoc routing and packet forwarding. As a result any security solution should encompass the protection of both. Protecting the network layer operations such as routing the control messages and data packet forwarding, from malicious attacks is an important and challenging issue in both wired and wireless mobile networks and the issue becomes even more challenging in the case of wireless mobile ad hoc network. Malicious nodes may disrupt routing algorithms by transmitting a false hop count; by dropping data packets and by routing the packets through unintended routes and so on. The work presented in this thesis attempts to improve the performance of wireless mobile ad hoc networks by protecting the network layer. Five studies are presented. Resumen de tesis doctoral presentada por el autor. Facultad de Informática |
description |
In wireless mobile ad hoc networks, packet delivery is achieved through two closely related network-layer operations: ad hoc routing and packet forwarding. As a result any security solution should encompass the protection of both. Protecting the network layer operations such as routing the control messages and data packet forwarding, from malicious attacks is an important and challenging issue in both wired and wireless mobile networks and the issue becomes even more challenging in the case of wireless mobile ad hoc network. Malicious nodes may disrupt routing algorithms by transmitting a false hop count; by dropping data packets and by routing the packets through unintended routes and so on. The work presented in this thesis attempts to improve the performance of wireless mobile ad hoc networks by protecting the network layer. Five studies are presented. |
publishDate |
2012 |
dc.date.none.fl_str_mv |
2012-04 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/review info:eu-repo/semantics/publishedVersion Revision http://purl.org/coar/resource_type/c_dcae04bc info:ar-repo/semantics/resenaArticulo |
format |
review |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://sedici.unlp.edu.ar/handle/10915/9713 |
url |
http://sedici.unlp.edu.ar/handle/10915/9713 |
dc.language.none.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
info:eu-repo/semantics/altIdentifier/url/http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Apr12-TO1.pdf info:eu-repo/semantics/altIdentifier/issn/1666-6038 |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess http://creativecommons.org/licenses/by-nc/3.0/ Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0) |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc/3.0/ Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0) |
dc.format.none.fl_str_mv |
application/pdf 39-40 |
dc.source.none.fl_str_mv |
reponame:SEDICI (UNLP) instname:Universidad Nacional de La Plata instacron:UNLP |
reponame_str |
SEDICI (UNLP) |
collection |
SEDICI (UNLP) |
instname_str |
Universidad Nacional de La Plata |
instacron_str |
UNLP |
institution |
UNLP |
repository.name.fl_str_mv |
SEDICI (UNLP) - Universidad Nacional de La Plata |
repository.mail.fl_str_mv |
alira@sedici.unlp.edu.ar |
_version_ |
1844615758870478848 |
score |
13.070432 |