A Review on Wireless Network Security (English)
- New search for: Sharma, Sandeep
- New search for: Mishra, Rajesh
- New search for: Singh, Karan
- New search for: Sharma, Sandeep
- New search for: Mishra, Rajesh
- New search for: Singh, Karan
In:
Quality, Reliability, Security and Robustness in Heterogeneous Networks
3
;
668-681
;
2013
- Article/Chapter (Book) / Electronic Resource
-
Title:A Review on Wireless Network Security
-
Contributors:
-
Published in:
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2013-01-01
-
Size:14 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
DSG-PC: Dynamic Social Grouping Based Routing for Non-uniform Buffer Capacities in DTN Supported with Periodic CarriersJohari, Rahul / Gupta, Neelima / Aneja, Sandhya et al. | 2013
- 16
-
Integrated Approach for Multicast Source Authentication and Congestion ControlSingh, Karan / Yadav, Rama Shankar et al. | 2013
- 31
-
Network Selection for Remote Healthcare Systems through Mapping between Clinical and Network ParameterAgrawal, Rajeev / Sehgal, Amit et al. | 2013
- 42
-
Performance Analysis of SMAC Protocol in Wireless Sensor Networks Using Network Simulator (Ns-2)Sakya, Gayatri / Sharma, Vidushi et al. | 2013
- 52
-
Routing Protocols in Mobile Ad-Hoc Network: A ReviewRenu, Bahuguna / lal, Mandoria Hardwari / Pranavi, Tayal et al. | 2013
- 61
-
Carrier Aggregation for Enhancement of Bandwidth in 4G SystemsParikh, Jolly / Basu, Anuradha et al. | 2013
- 75
-
A Stable Energy-Efficient Location Based Clustering Scheme for Ad Hoc NetworksMohindra, Anubhuti Roda / Kumar, Charu et al. | 2013
- 86
-
Comparative Analysis of Contention Based Medium Access Control Protocols for Wireless Sensor NetworksSonkar, Chandan Kumar / Sangwan, Om Prakash / Tripathi, Arun Mani et al. | 2013
- 104
-
SEP-E (RCH): Enhanced Stable Election Protocol Based on Redundant Cluster Head Selection for HWSNsPal, Raju / Sindhu, Ritu / Sharma, Ajay K et al. | 2013
- 115
-
Mobility Based Energy Efficient Coverage Hole Maintenance for Wireless Sensor NetworkSagar, Anil Kumar / Lobiyal, D. K. et al. | 2013
- 128
-
HASL: High-Speed AUV-Based Silent Localization for Underwater Sensor NetworksOjha, Tamoghna / Misra, Sudip et al. | 2013
- 141
-
Clusterhead Selection Using Multiple Attribute Decision Making (MADM) Approach in Wireless Sensor NetworksAzad, Puneet / Sharma, Vidushi et al. | 2013
- 155
-
Key Pre-distribution in a Non-uniform Network Using Combinatorial DesignMitra, Sarbari / Mukhopadhyay, Sourav et al. | 2013
- 171
-
FLAME: A Flexible and Low-Power Architecture for Wireless Mesh NetworksSajjadi Torshizi, Seyed Dawood / Mohammadalian, Sadra / Hashim, Fazirulhisyam / Shamala, Subramaniam et al. | 2013
- 185
-
Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSADuvvuru, Rajesh / Singh, Sunil Kumar / Rao, Gudikhandula Narasimha / Kote, Ashok / Krishna, Bangaru Bala / Raju, Moturu Vijaya et al. | 2013
- 197
-
The Outage Analysis of Inter-relay Coded Cooperation over Nakagami-m Fading ChannelsSharma, Prabhat Kumar / Garg, Parul et al. | 2013
- 207
-
Power Efficient MAC Protocol for Mobile Ad Hoc NetworksYadav, Sohan Kumar / Lobiyal, D. K. et al. | 2013
- 218
-
Fault Tolerant Range Grouping Routing in Dynamic NetworksBhardwaj, Akanksha / Badera, Prachi / Rajalakshmi, K. et al. | 2013
- 228
-
Deployment of Sensors in Regular Terrain in Form of Interconnected WSN UnitsChattopadhyay, Arup Kr. / Bhattacharyya, Chandan Kr. et al. | 2013
- 238
-
3-Tier Heterogeneous Network Model for Increasing Lifetime in Three Dimensional WSNsSingh, Samayveer / Chand, Satish / Kumar, Bijendra et al. | 2013
- 248
-
A Comparative Study of Reactive Routing Protocols for Industrial Wireless Sensor NetworksKumar, Manish / Gupta, Itika / Tiwari, Sudarshan / Tripathi, Rajeev et al. | 2013
- 261
-
Mobile Based Attendance System in Distributed LAN ServerSrivastava, Ratnesh Prasad / Mandoria, Hardwari Lal / Nautiyal, Rajesh et al. | 2013
- 273
-
An Improved Method for Contrast Enhancement of Real World Hyperspectral ImagesLal, Shyam / Kumar, Rahul / Chandra, Mahesh et al. | 2013
- 283
-
Wavelet Analysis of Electrical Signals from Brain: The ElectroencephalogramDhiman, Rohtash / Priyanka / Saini, J. S. et al. | 2013
- 290
-
Design and Analysis of Small Planar Antenna Based on CRLH Metamaterial for WSN ApplicationJain, Sanjeev / Singh, Indrasen / Tripathi, Vijay Shanker / Tiwari, Sudarshan et al. | 2013
- 298
-
Classification of Speech Dysfluencies Using Speech Parameterization Techniques and Multiclass SVMMahesha, P. / Vinod, D. S. et al. | 2013
- 309
-
RoboGardner: A Low-Cost System with Automatic Plant Identification Using MarkersAswani, Reema / Hema, N. et al. | 2013
- 325
-
6H-SiC Based Power VJFET and Its Temperature DependenceKhan, Amir / Hasan, Mohd. / Sadat, Anwar / Usmani, Shamsuz Z. et al. | 2013
- 333
-
Change Detection from Satellite Images Using PNNMehrotra, Akansha / Singh, Krishna Kant / Pal, Kirat / Nigam, M. J. et al. | 2013
- 341
-
Optimal Location and Size of Different Type of Distributed Generation with Voltage Step Constraint and Mixed Load ModelsPayasi, Rajendra P. / Singh, Asheesh K. / Singh, Devender et al. | 2013
- 358
-
Microstrip Patch Antenna Miniaturization Using Planar Metamaterial Unit CellSingh, Indrasen / Jain, Sanjeev / Tripathi, Vijay Shanker / Tiwari, Sudarshan et al. | 2013
- 365
-
Simulation and Modeling of a Constant Voltage Controller Based Solar Powered Water Pumping SystemKumar, Bhavnesh / Chauhan, Yogesh K. / Shrivastava, Vivek et al. | 2013
- 377
-
Design of Low Power FSM Using Verilog in VLSIMittal, Himani / Chandra, Dinesh / Tiwari, Arvind et al. | 2013
- 387
-
Pruning Search Spaces of RATA Model for the Job-Shop SchedulingArfi, Farid / Ilié, Jean-Michel / Saidouni, Djamel-Eddine et al. | 2013
- 402
-
Fuzzy Approach for Image Near-Duplicate Detection Using Gray Level Vertex Matching in Attribute Relational Bipartite GraphsDatta, Goutam / Raina, Bushan L. et al. | 2013
- 415
-
Formal Modeling of Mobile Middleware for Tuple Space Coordination over Multiple Heterogeneous NetworksDe, Suddhasil / Goswami, Diganta / Nandi, Sukumar et al. | 2013
- 431
-
Simplified Control Algorithm Based on IRP Theory for Three Phase Shunt Active Power FilterMaurya, Ajay Kumar / Chauhan, Yogesh K. et al. | 2013
- 441
-
Real Time Object Tracking: Simulation and Implementation on FPGA Based Soft ProcessorPandey, Manoj / Borgohain, Dorothi / Baruah, Gargi / Ubhi, J. S. / Raju, Kota Solomon et al. | 2013
- 451
-
Reduced Complexity Pseudo-fractional Adaptive Algorithm with Variable Tap-Length SelectionKar, Asutosh / Chandra, Mahesh et al. | 2013
- 461
-
An Efficient and Secure Micro-payment Transaction Using Shell CryptographyTiwari, Mayank / Kumar, Rajeshwar / Jindal, Shaivya / Sharma, Pankaj / Priyanshu et al. | 2013
- 470
-
High Speed Reconfigurable FPGA Based Digital FilterRizvi, Navaid Z. / Shamim, Raaziyah / Mishra, Rajesh / Sharma, Sandeep et al. | 2013
- 479
-
Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection SystemRoy, Sanjiban Sekhar / Viswanatham, V. Madhu / Krishna, P. Venkata / Saraf, N. / Gupta, A. / Mishra, Rajesh et al. | 2013
- 485
-
NTTM: Novel Transmission Time Based Mechanism to Detect Wormhole AttackChanchal, Kumar / Lobiyal, D. K. et al. | 2013
- 496
-
A Privacy Preserving Representation for Web Service Communicators’ in the CloudChandramohan, D. / Vengattaraman, T. / Rajaguru, D. / Baskaran, R. / Dhavachelvan, P. et al. | 2013
- 507
-
Detailed Dominant Approach Cloud Computing Integration with WSNLal, Niranjan / Qamar, Shamimul / Singh, Mayank et al. | 2013
- 517
-
Secret Image Sharing Scheme Based on Pixel ReplacementBhattacharjee, Tapasi / Singh, Jyoti Prakash et al. | 2013
- 527
-
An Application of Defeasible Logic Programming for Firewall Verification and ReconfigurationRajkhowa, Pritom / Hazarika, Shyamanta M. / Simari, Guillermo R. et al. | 2013
- 543
-
Threats and Challenges to Security of Electronic Health RecordsBhartiya, Shalini / Mehrotra, Deepti et al. | 2013
- 560
-
On Second-Order Nonlinearities of Two Classes of Cubic Boolean FunctionsSingh, Deep / Bhaintwal, Maheshanand et al. | 2013
- 568
-
A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management SystemMishra, Dheerendra / Mukhopadhyay, Sourav et al. | 2013
- 578
-
GAS: A Novel Grid Based Authentication SystemGowraj, Narayan / Avireddy, Srinivas / Prabhu, Sruthi et al. | 2013
- 591
-
Multiplicative Watermarking of Audio in Spectral DomainSingh, Jyotsna / Garg, Parul / De, Alok Nath et al. | 2013
- 606
-
A Comparative Analysis of Various Deployment Based DDoS Defense SchemesSingh, Karanbir / Kaur, Navdeep / Nehra, Deepa et al. | 2013
- 617
-
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart DevicesFan, Xinxin / Mandal, Kalikinkar / Gong, Guang et al. | 2013
- 633
-
Protecting PLM Data Throughout Their LifecycleRanchal, Rohit / Bhargava, Bharat et al. | 2013
- 643
-
Filtering Nonlinear Feedback Shift Registers Using Welch-Gong Transformations for Securing RFID ApplicationsMandal, Kalikinkar / Gong, Guang et al. | 2013
- 658
-
Performance Analysis of Cryptographic Acceleration in Multicore EnvironmentDutta, Yashpal / Sethi, Varun et al. | 2013
- 668
-
A Review on Wireless Network SecuritySharma, Sandeep / Mishra, Rajesh / Singh, Karan et al. | 2013
- 682
-
Improved Proxy Signature Scheme without Bilinear PairingsPadhye, Sahadeo / Tiwari, Namita et al. | 2013
- 689
-
Enhanced Block Playfair CipherKumar, Arvind / Mehra, Pawan Singh / Gupta, Gagan / Sharma, Manika et al. | 2013
- 696
-
Ciphertext-Policy Attribute-Based Encryption with User Revocation SupportBalu, A. / Kuppusamy, K. et al. | 2013
- 706
-
A Proposal for SMS Security Using NTRU CryptosystemNanda, Ashok Kumar / Awasthi, Lalit Kumar et al. | 2013
- 719
-
Analysis and Improvement of an Authentication Scheme Using Smart CardsKaul, Sonam Devgan / Awasthi, Amit K. et al. | 2013
- 729
-
A Review on Remote User Authentication Schemes Using Smart CardsSrivastava, Keerti / Awasthi, Amit K. / Mittal, R. C. et al. | 2013
- 750
-
Outlier Detection and Treatment for Lightweight Mobile Ad Hoc NetworksKumar, Adarsh / Gopal, Krishna / Aggarwal, Alok et al. | 2013
- 764
-
Image Secret Sharing in Stego-Images with AuthenticationNag, Amitava / Biswas, Sushanta / Sarkar, Debasree / Sarkar, Partha Pratim et al. | 2013
- 771
-
On Generalized Nega–Hadamard TransformChaturvedi, Ankita / Gangopadhyay, Aditi Kar et al. | 2013
- 778
-
Design of High Performance MIPS Cryptography ProcessorSingh, Kirat Pal / Parmar, Shivani / Kumar, Dilip et al. | 2013
- 794
-
Design of an Edge Detection Based Image Steganography with High Embedding CapacityPal, Arup Kumar / Pramanik, Tarok et al. | 2013
- 801
-
Trust Management Method for Vehicular Ad Hoc NetworksShaikh, Riaz Ahmed / Alzahrani, Ahmed Saeed et al. | 2013
- 816
-
Feature and Future of Visual Cryptography Based SchemesPandey, Dhiraj / Kumar, Anil / Singh, Yudhvir et al. | 2013
- 831
-
A Novel Framework for Users’ Accountability on Online Social NetworksMohit, Gambhir / M.N., Doja / Moinuddin et al. | 2013
- 842
-
Network Security Using ECC with BiometricMahto, Dindayal / Yadav, Dilip Kumar et al. | 2013
- 854
-
Hybrid Key Management Technique for WSN’sKodali, Ravi Kishore / Chougule, Sushant et al. | 2013
- 866
-
DRMWSN-Detecting Replica Nodes Using Multiple Identities in Wireless Sensor NetworkAmbika, Nagaraj / Raju, G. T. et al. | 2013
- 879
-
Security Improvement in Group Key ManagementManjul, Manisha / Kumar, Rakesh / Mishra, Rajesh et al. | 2013
- 904
-
Secure Real Time Scheduling on Cluster with Energy MinimizationOjha, Rudra Pratap / Yadav, Rama Shankar / Tripathi, Sarsij et al. | 2013
- 915
-
Wireless Sensor Node Placement Due to Power Loss Effects from Surrounding VegetationPaul, B. S. / Rimer, S. et al. | 2013
- 928
-
Increasing the Reliability of Fuzzy Angle Oriented Cluster Using Peer-to-PeerNaga Venkata Jagan Mohan, Remani / Srinivas, Vegi / Rajasekhara Rao, Kurra et al. | 2013
- 939
-
Extended Ant Colony Optimization Algorithm (EACO) for Efficient Design of Networks and Improved ReliabilityAshraf, Mohd / Mishra, Rajesh et al. | 2013
- 951
-
Evaluation of Understandability of Object-Oriented DesignSoni, Devpriya et al. | 2013
- 962
-
Safety Analysis of Automatic Door Operation for Metro Train: A Case StudyPandey, Ajeet Kumar / Panchangam, Srinivas / Smith, Jessy George et al. | 2013
- 975
-
A Generalized Model for Internet-Based Access Control Systems with Delegation SupportBuranasaksee, Utharn / Porkaew, Kriengkrai / Supasitthimethee, Umaporn et al. | 2013
- 989
-
QoS Support Downlink for WiMAX NetworkGupta, Pooja / Kumar, Brijesh / Raina, B. L. et al. | 2013
- 998
-
A Framework of Service Selection and Composition for Flexible Network ArchitectureSingh, Akhilendra Pratap / Vyas, O. P. / Varma, Shirshu et al. | 2013