Sciweavers

459 search results - page 78 / 92
» A Reputation-Based Trust Mechanism for Ad Hoc Networks
Sort
View
GI
2004
Springer
15 years 3 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
MONET
2002
142views more  MONET 2002»
14 years 9 months ago
Defending Wireless Infrastructure Against the Challenge of DDoS Attacks
This paper addresses possible Distributed Denial-of-Service (DDoS) attacks toward the wireless Internet including the Wireless Extended Internet, the Wireless Portal Network, and t...
Xianjun Geng, Yun Huang, Andrew B. Whinston
VTC
2007
IEEE
117views Communications» more  VTC 2007»
15 years 4 months ago
Hop Distance Based Routing Protocol for MANET
—The Hop Distance based Routing Protocol (HDR) is an on-demand based routing protocol suited for mobile ad hoc networks integrated with wired networks. HDR considers an efficient...
Filip Cuckov, Min Song
ACSC
2004
IEEE
15 years 1 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
SOCA
2007
IEEE
15 years 4 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...