Sciweavers

1813 search results - page 8 / 363
» A Secure Routing Protocol for Ad Hoc Networks
Sort
View
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
15 years 3 months ago
Secure Dynamic Source Routing
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
121
Voted
INFOCOM
2003
IEEE
15 years 2 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
IJSNET
2007
91views more  IJSNET 2007»
14 years 9 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
TISSEC
2008
80views more  TISSEC 2008»
14 years 9 months ago
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
Baruch Awerbuch, Reza Curtmola, David Holmer, Cris...