Sciweavers

227 search results - page 28 / 46
» Attack Analysis and Detection for Ad Hoc Routing Protocols
Sort
View
ICNP
2009
IEEE
15 years 6 months ago
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...
IPCCC
2006
IEEE
15 years 5 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...
IJWIN
2002
111views more  IJWIN 2002»
14 years 11 months ago
Internet Connectivity for Ad Hoc Mobile Networks
The growing deployment rate of wireless LANs indicates that wireless networking is rapidly becoming a prevalent form of communication. As users become more accustomed to the use o...
Yuan Sun, Elizabeth M. Belding-Royer, Charles E. P...
WIOPT
2006
IEEE
15 years 5 months ago
Color-based broadcasting for ad hoc networks
— This paper develops a novel color-based broadcast scheme for wireless ad hoc networks where each forwarding of the broadcast message is assigned a color from a given pool of co...
Alireza Keshavarz-Haddad, Vinay J. Ribeiro, Rudolf...
ICC
2007
IEEE
108views Communications» more  ICC 2007»
15 years 6 months ago
Trust Establishment in Distributed Networks: Analysis and Modeling
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Yan Lindsay Sun, Yafei Yang