Sciweavers

705 search results - page 63 / 141
» A Mobicast Routing Protocol in Vehicular Ad-Hoc Networks
Sort
View
ENTCS
2006
173views more  ENTCS 2006»
14 years 12 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
ACSAC
2004
IEEE
15 years 3 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
INFOCOM
2002
IEEE
15 years 4 months ago
Gossip-based ad hoc routing
— Many ad hoc routing protocols are based on (some variant of) flooding. Despite various optimizations, many routing messages are propagated unnecessarily. We propose a gossipin...
Zygmunt J. Haas, Joseph Y. Halpern, Erran L. Li
JOIN
2006
113views more  JOIN 2006»
14 years 11 months ago
Local Detection of Selfish Routing Behavior in Ad Hoc Networks
Reputation mechanisms for detecting and punishing free-riders in ad hoc networks depend on the local detection of selfish behavior. Although naive selfish strategies based on drop...
Bo Wang 0001, Sohraab Soltani, Jonathan K. Shapiro...
VALUETOOLS
2006
ACM
112views Hardware» more  VALUETOOLS 2006»
15 years 5 months ago
Performance of ad hoc networks with two-hop relay routing and limited packet lifetime
— Considered is a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing protocol. Packets at relay no...
Ahmad Al Hanbali, Philippe Nain, Eitan Altman