Abstract | ||
---|---|---|
The rapidly developing ad-hoc network technology has a wide range of applications, such as vehicular ad-hoc networks (VANETs), wireless sensor networks (WSNs), and emergency and military communications. Due to the characteristics such as openness and dynamic topology, ad-hoc networks suffer from various attacks in the data plane. Even worse, some attacks can subvert or bypass the frequently used i... |
Year | DOI | Venue |
---|---|---|
2016 | 10.1109/TVT.2015.2495325 | IEEE Transactions on Vehicular Technology |
Keywords | Field | DocType |
Ad hoc networks,Fuzzy logic,Cryptography,Protocols,Fuzzy sets,Routing | Forwarding plane,Link-state routing protocol,Computer security,Computer science,Computer network,Wireless Routing Protocol,Ad hoc wireless distribution service,Optimized Link State Routing Protocol,Wireless ad hoc network,Wireless sensor network,Vehicular ad hoc network | Journal |
Volume | Issue | ISSN |
65 | 9 | 0018-9545 |
Citations | PageRank | References |
11 | 0.58 | 23 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Shuaishuai Tan | 1 | 30 | 2.53 |
Xiaoping Li | 2 | 15 | 5.71 |
Qingkuan Dong | 3 | 20 | 5.29 |