Authors
E Shakshuki, Nan Kang, T Sheltami
Publication date
2013/3
Journal
IEEE Transactions on Industrial Electronics
Volume
60
Issue
3
Pages
1089-1098,
Publisher
IEEE
Description
The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they rely on their neighbors to relay messages. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET vulnerable to malicious attackers. In this case …
Total citations
201220132014201520162017201820192020202120222023202441880769558624436191782
Scholar articles
EM Shakshuki, N Kang, TR Sheltami - IEEE Transactions on industrial electronics, 2012