M
Manel Guerrero Zapata
Researcher at Polytechnic University of Catalonia
Publications - 23
Citations - 1956
Manel Guerrero Zapata is an academic researcher from Polytechnic University of Catalonia. The author has contributed to research in topics: Ad hoc wireless distribution service & Optimized Link State Routing Protocol. The author has an hindex of 12, co-authored 23 publications receiving 1858 citations. Previous affiliations of Manel Guerrero Zapata include Nokia & Hashemite University.
Papers
More filters
Proceedings ArticleDOI
Securing ad hoc routing protocols
Manel Guerrero Zapata,N. Asokan +1 more
TL;DR: In this paper, the authors consider the problem of incorporating security mechanisms into routing protocols for ad hoc networks and develop a security mechanism to protect AODV routing information, which is also applicable to other similar routing protocols and about how a key management scheme could be used in conjunction with the solution.
Journal ArticleDOI
Secure ad hoc on-demand distance vector routing
TL;DR: An overview of different approaches to provide security features to routing protocols in mobile ad hoc networks (MANET) is given and Secure AODV is described giving a summary of its operation and talking about future enhancements to the protocol.
Journal ArticleDOI
Wireless Multimedia Sensor Networks: Current Trends and Future Directions
TL;DR: The design challenges of WMSNs are outlined, a comprehensive discussion of the proposed architectures, algorithms and protocols for the different layers of the communication protocol stack for WMSN's are given, and the existing WMSN hardware and testbeds are evaluated.
Journal ArticleDOI
Game theory for energy efficiency in Wireless Sensor Networks
TL;DR: This survey reviews the most recent papers about using game theory in WSNs to achieve a trade-off between maximizing the network lifetime and providing the required service and contains a complete taxonomy of games applied to this specific research problem.
Journal ArticleDOI
Review: Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation
TL;DR: The paper discusses the use of Public Key Infrastructure (PKI) (and certificates revocation), location privacy, anonymity and group signatures for VANETs, and compares several proposals to identify and evict misbehaving and faulty nodes.