Sciweavers

1677 search results - page 58 / 336
» A distributed security scheme for ad hoc networks
Sort
View
ICON
2007
IEEE
15 years 6 months ago
Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks
-- This paper presents a hardware based cache scheme to detect misbehaving nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upper-layer s...
Hongxun Liu, José G. Delgado-Frias, Sirisha...
ICDCSW
2003
IEEE
15 years 5 months ago
ContextCube - Providing Context Information Ubiquitously
Sensing the state of the environment is an important source for context-aware applications. Several approaches exist to provide sensor information to mobile application nodes. As ...
Martin Bauer, Christian Becker, Jörg Häh...
CIIT
2007
195views Communications» more  CIIT 2007»
15 years 1 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
ESAS
2005
Springer
15 years 5 months ago
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks
Abstract. In this paper, we propose a framework for the security analysis of on-demand, distance vector routing protocols for ad hoc networks, such as AODV, SAODV, and ARAN. The pr...
Gergely Ács, Levente Buttyán, Istv&a...