2020
DOI: 10.1088/1757-899x/993/1/012063
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of The Design and Security Mechanisms of The Wireless Networks and Mobile Ad-Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Trusted mobile node affiliation with in its correspondence, one of the trusted moving nodes Range indicates the accident site's land situation. The use of a wireless network makes it possible for businesses to prevent the expensive process of cable deployment in buildings or as a bridge between various installation locations [16]. Wireless communication system should effectively support a universal and ubiquitous cyber physical infrastructure for a huge variety of applications with novel network structure, spectrum access schemes, and resource allocation solutions, while taking into account the energy efficiency and security/privacy considerations.…”
Section: Related Workmentioning
confidence: 99%
“…Trusted mobile node affiliation with in its correspondence, one of the trusted moving nodes Range indicates the accident site's land situation. The use of a wireless network makes it possible for businesses to prevent the expensive process of cable deployment in buildings or as a bridge between various installation locations [16]. Wireless communication system should effectively support a universal and ubiquitous cyber physical infrastructure for a huge variety of applications with novel network structure, spectrum access schemes, and resource allocation solutions, while taking into account the energy efficiency and security/privacy considerations.…”
Section: Related Workmentioning
confidence: 99%
“…However, this shift is not without its challenges and drawbacks. Wireless communication networks are increasingly responsible for transmitting sensitive data [52] [69]. Since wireless transmissions are broadcast, the data being sent is vulnerable to eavesdropping [3] [70].…”
Section: Introductionmentioning
confidence: 99%
“…While the IDS may not directly halt an attack, it certainly serves as an early warning system for administrators, enabling them to take other measures to mitigate potential damage . Kumar et al, 2020). An Intrusion Prevention System (IPS) is defined as a network security system designed to detect and prevent identified attacks from potential attackers (Forcepoint, 2019;, Humayun, Niazi et al, 2022, Humayun, Almotilag et al, 2022.…”
Section: Introductionmentioning
confidence: 99%