Sciweavers

337 search results - page 3 / 68
» Attack Resiliency of Network Topologies
Sort
View
WIMOB
2007
IEEE
13 years 11 months ago
A Fault Resilient Routing Protocol for Mobile Ad-Hoc Networks
— In a Mobile Ad hoc NETwork (MANET), mobile devices cooperate to forward packets for each other without the assistance of dedicated routing infrastructures. Due to its networkin...
Sirisha Medidi, Jiong Wang
CN
2006
98views more  CN 2006»
13 years 5 months ago
Internet resiliency to attacks and failures under BGP policy routing
We investigate the resiliency of the Internet at the Autonomous System (AS) level to failures and attacks, under the real constraint of business agreements between the ASs. The ag...
Danny Dolev, Sugih Jamin, Osnat Mokryn, Yuval Shav...
INFOCOM
2006
IEEE
13 years 11 months ago
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sen...
Tanveer Zia, Albert Y. Zomaya
CN
2010
103views more  CN 2010»
13 years 5 months ago
Resilient and survivable networks
This poster discusses methods to characterize the resilience of networks to a number of challenges and attacks, with the goal of developing quantifiable metrics to determine the de...
Bernhard Plattner, David Hutchison, James P. G. St...
RIVF
2008
13 years 6 months ago
Robust overlay network with Self-Adaptive topology: Protocol description
We introduce a new overlay network named ROSA1 . Overlay networks offer a way to bypass the routing constraints of the underlying network. ROSA used this overlay network property t...
Loic Baud, Nguyen Pham, Patrick Bellot