Sciweavers

133 search results - page 3 / 27
» Neutralization of Errors and Attacks in Wireless Ad Hoc Netw...
Sort
View
ICWN
2003
13 years 6 months ago
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point ...
Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantarad...
ADHOC
2008
132views more  ADHOC 2008»
13 years 4 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
GLOBECOM
2009
IEEE
13 years 8 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
MOBIQUITOUS
2005
IEEE
13 years 10 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao