2017
DOI: 10.1016/j.adhoc.2016.11.001
|View full text |Cite
|
Sign up to set email alerts
|

Heterogeneous ad hoc networks: Architectures, advances and challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
52
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 158 publications
(52 citation statements)
references
References 72 publications
0
52
0
Order By: Relevance
“…As mentioned in Qiu et al, 40 the centralized approach deploys a single entity for controlling the whole group; hence, a group key management protocol seeks to minimize storage requirements, computational overhead and bandwidth utilization, and network traffic caused by users' joins and leaves. 41 The distributed key management mechanism uses a key group that is built by every group member attached to the RSU.…”
Section: Key Management Mechanismmentioning
confidence: 99%
“…As mentioned in Qiu et al, 40 the centralized approach deploys a single entity for controlling the whole group; hence, a group key management protocol seeks to minimize storage requirements, computational overhead and bandwidth utilization, and network traffic caused by users' joins and leaves. 41 The distributed key management mechanism uses a key group that is built by every group member attached to the RSU.…”
Section: Key Management Mechanismmentioning
confidence: 99%
“…7,8 Its concoction architecture helps to tackle several challenges that are raised by geographical obstructions like broken bridges, storm, flood closed roads, etc, and the network can be modeled in different forms. 7,8 Its concoction architecture helps to tackle several challenges that are raised by geographical obstructions like broken bridges, storm, flood closed roads, etc, and the network can be modeled in different forms.…”
Section: Introductionmentioning
confidence: 99%
“…These schemes can be broadly classified [7][8][9][10][11][12] into two types.  Reputation-based schemes  Credit-based schemes.…”
Section: Literature Survey a Schemes To Prevent Selfishness In Mmentioning
confidence: 99%