DocumentCode :
3091737
Title :
Notice of Violation of IEEE Publication Principles
Security in Vehicular Ad-hoc Networks
Author :
Sehgal, Umesh ; Kaur, Kuljeet ; Kumar, Pawan
Author_Institution :
Dept. of Comput. Applic., Lovely Prof. Univ., Phagwara, India
Volume :
2
fYear :
2009
fDate :
28-30 Dec. 2009
Firstpage :
485
Lastpage :
488
Abstract :
Notice of Violation of IEEE Publication Principles

"Security in Vehicular Ad-hoc Networks"
by Umesh Sehgal, Kuljeet Kaur, Pawan Kumar
in the Proceedings of the 2009 Second International Conference on Computer and Electrical Engineering ICCEE 09, December 2009, pp. 485-488

After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE\´s Publication Principles.

This paper contains significant portions of original text from the paper cited below. The original text was copied with insufficient attribution (including appropriate references to the original author(s) and/or paper title) and without permission.

Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:

"Security in Ad-hoc Networks"
by Arun Kumar Bayya, Siddhartha Gupte, Yogesh Kumar Shukla, Anil Garikapati
Student paper, Computer Science Department, University of Kentucky, 2006

Ad-hoc networks are an emerging area of mobile computing. There are various challenges that are faced in the ad-hoc environment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there are no resources to set up elaborate networks. Ad-hoc networks therefore throw up new requirements and problems in all areas of networking. The solutions for conventional networks are usually not sufficient to provide efficient ad-hoc operations. The wireless nature of communication and lack of any security infrastructure raise several security problems. In this paper we attempt to analyze the demands of Ad-hoc environment. We focus on three areas of ad-hoc networks, key exchange and management, ad-hoc routing, and intrusion detection. The key issues concerning these are as have been addressed here. We have tried to compile solutions to these problems that have been active areas of research.
Keywords :
ad hoc networks; mobile radio; telecommunication network routing; telecommunication security; ad-hoc routing; intrusion detection; mobile computing; security infrastructure; security problems; vehicular ad-hoc network security; Ad hoc networks; Certification; Communication system security; Computer applications; Computer networks; Computer security; Intelligent networks; Public key; Routing; Wireless communication; Authenticated; Certification; Networks; Protocols; Replication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer and Electrical Engineering, 2009. ICCEE '09. Second International Conference on
Conference_Location :
Dubai
Print_ISBN :
978-1-4244-5365-8
Electronic_ISBN :
978-0-7695-3925-6
Type :
conf
DOI :
10.1109/ICCEE.2009.146
Filename :
5380248
Link To Document :
بازگشت