Sciweavers

25 search results - page 4 / 5
» Efficient Authentication for Reactive Routing Protocols
Sort
View
CCS
2006
ACM
13 years 9 months ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...
AINA
2007
IEEE
14 years 15 days ago
Reference Path Ad Hoc Routing Mechanism
The purpose of this work is to present the Reference Path Ad hoc Routing (REPAR) mechanism, which has been designed to optimize the performance of reactive ad hoc routing protocol...
Fabricio L. Figueiredo, Paulo Cardieri, Marcel C. ...
ACISP
2006
Springer
13 years 10 months ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 6 months ago
ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route Requests
Reactive routing protocols like Ad-hoc On-Demand Distance Vector Routing (AODV) and Dynamic Source Routing in Ad-Hoc Wireless Networks (DSR) which are used in Mobile and Ad-hoc Ne...
Jayesh Kataria, P. S. Dhekne, Sugata Sanyal
AINA
2010
IEEE
13 years 11 months ago
Gradient Based Routing Support for Cooperative Multi-channel MAC in Ad Hoc Wireless Networks
— Growing popularity of wireless ad hoc networks leads to higher demands on performance of all TCP/IP stack layers. Usually ad hoc networks operate according to IEEE 802.11 stand...
Stepan Ivanov, Dmitri Botvich, Sasitharan Balasubr...