2017
DOI: 10.3103/s0146411617080119
|View full text |Cite
|
Sign up to set email alerts
|

Security evaluation of a wireless ad-hoc network with dynamic topology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…Furthermore, because of the dynamic topology of FANETs, it is very hard to distinguish between a legitimate and malicious node. A legitimate node may also misbehave for a short period of time due to poor connection quality or loss of route [116]. Moreover, the UAV launched by the attacker may behave properly for some time to gain trust, but simultaneously, it may also create inconsistencies in the routing.…”
Section: Packet Forwardingmentioning
confidence: 99%
“…Furthermore, because of the dynamic topology of FANETs, it is very hard to distinguish between a legitimate and malicious node. A legitimate node may also misbehave for a short period of time due to poor connection quality or loss of route [116]. Moreover, the UAV launched by the attacker may behave properly for some time to gain trust, but simultaneously, it may also create inconsistencies in the routing.…”
Section: Packet Forwardingmentioning
confidence: 99%
“…These are network traffic [6][7][8] and physical node data [9,10]. Today, there are a large number of works aimed at analyzing network traffic in monitoring systems to solve various security problems [11][12][13]. Recently, this field has been dominated by works using streaming information processing technologies [14] or (earlier) combining streaming and batch technologies [6,15].…”
Section: Related Workmentioning
confidence: 99%