scispace - formally typeset
K

Kia Makki

Researcher at University of America

Publications -  70
Citations -  1497

Kia Makki is an academic researcher from University of America. The author has contributed to research in topics: Wireless sensor network & Wireless ad hoc network. The author has an hindex of 16, co-authored 70 publications receiving 1437 citations. Previous affiliations of Kia Makki include Florida International University & National Ilan University.

Papers
More filters
Journal ArticleDOI

Sensor network security: a survey

TL;DR: This paper identifies the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analysis first, and gives a holistic overview of security issues.
Proceedings ArticleDOI

MURU: A Multi-Hop Routing Protocol for Urban Vehicular Ad Hoc Networks

TL;DR: A multi-hop routing protocol, called MURU that is able to find robust paths in urban VANETs to achieve high end-to-end packet delivery ratio with low overhead and is sufficiently justified through theoretical analysis and the protocol is evaluated with extensive simulations.
Book ChapterDOI

Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks

TL;DR: A secure routing protocol based on AODV for multihop ad hoc networks capable of finding a secure end-to-end route free of any malicious entity, thus resisting an internal attack within the network either in the form of compromised or disloyal nodes.
Proceedings ArticleDOI

Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks

TL;DR: An extension of T-AODV that can withstand attack by multiple malicious nodes acting in collusion to disrupt the network is proposed, which finds a secure end-to-end path free of malicious nodes and can effectively isolate a malicious entity trying to attack the network independently or in collusion with other malicious entities.
Proceedings ArticleDOI

Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy

TL;DR: This paper investigates when for each node it is cost-effective to freely participate in the security mechanism or protect its privacy depending if that node believes or trusts that all other nodes or at least a minimum number of other nodes will do the same.