Many security schemes for mobile ad-hoc network(MANET) have been proposed so far but none of them
has been successful in combating the different types of attacks that a mobile ad-hoc network often faces.
This paper is providing one way of mitigating attacks in mobile ad-hoc networks by authenticating the node
who tries to access this network .This scheme has been applied by using cellular automata (CA). Our
simulation results show how cellular automata(CA) is implemented for user authentication and secure
transmission in MANET.
%0 Journal Article
%1 noauthororeditor
%A Saha, Himadri Nath
%A Bhattacharyya, Debika
%A Banerjee, P. K.
%D 2012
%J A Novel Approach for Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automatas
%K Ad Cellular Node Shared User authentication automata capturing hoc key mechanism network
%N 2
%P 16
%R 10.5121/ijasuc.2012.3204
%T A Novel Approach for Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automatas
%U http://aircconline.com/ijasuc/V3N2/3212ijasuc04.pdf
%V 3
%X Many security schemes for mobile ad-hoc network(MANET) have been proposed so far but none of them
has been successful in combating the different types of attacks that a mobile ad-hoc network often faces.
This paper is providing one way of mitigating attacks in mobile ad-hoc networks by authenticating the node
who tries to access this network .This scheme has been applied by using cellular automata (CA). Our
simulation results show how cellular automata(CA) is implemented for user authentication and secure
transmission in MANET.
@article{noauthororeditor,
abstract = {Many security schemes for mobile ad-hoc network(MANET) have been proposed so far but none of them
has been successful in combating the different types of attacks that a mobile ad-hoc network often faces.
This paper is providing one way of mitigating attacks in mobile ad-hoc networks by authenticating the node
who tries to access this network .This scheme has been applied by using cellular automata (CA). Our
simulation results show how cellular automata(CA) is implemented for user authentication and secure
transmission in MANET. },
added-at = {2018-04-17T06:24:15.000+0200},
author = {Saha, Himadri Nath and Bhattacharyya, Debika and Banerjee, P. K.},
biburl = {https://www.bibsonomy.org/bibtex/2c7f1eeab6387d21a56efc1fab715cba9/usmankhawaja},
doi = {10.5121/ijasuc.2012.3204},
interhash = {0f99ca4aff970da3b0aad61cc0f6b2d2},
intrahash = {c7f1eeab6387d21a56efc1fab715cba9},
issn = {0976 - 1764},
journal = {A Novel Approach for Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automatas},
keywords = {Ad Cellular Node Shared User authentication automata capturing hoc key mechanism network},
month = {April},
number = 2,
pages = 16,
timestamp = {2018-04-17T06:24:15.000+0200},
title = {A Novel Approach for Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automatas},
url = {http://aircconline.com/ijasuc/V3N2/3212ijasuc04.pdf},
volume = 3,
year = 2012
}