Sciweavers

1101 search results - page 59 / 221
» Ad hoc routing based on the stability of routes
Sort
View
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 7 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
EUC
2005
Springer
15 years 6 months ago
Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks
Wireless Ad Hoc networks are particularly vulnerable due to their fundamental characteristics such as an open medium, dynamic topology, distributed cooperation and constrained capa...
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Le...
ICCCN
2007
IEEE
15 years 7 months ago
A Bio-Inspired Robust Routing Protocol for Mobile Ad Hoc Networks
—In this paper we discuss robustness issues of a biologically inspired routing protocol for mobile ad hoc networks and the influence it has on the Quality of Service (QoS) in th...
Kenji Leibnitz, Naoki Wakamiya, Masayuki Murata
AINA
2005
IEEE
15 years 7 months ago
Global Connectivity for Mobile IPv6-Based Ad Hoc Networks
The IPv6-enabled network architecture has recently attracted much attention. In this paper, we address the issue of connecting MANETs to global IPv6 networks while supporting IPv6...
Chiung-Ying Wang, Cheng-Ying Li, Ren-Hung Hwang, Y...
IJSNET
2007
91views more  IJSNET 2007»
15 years 1 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...