Sciweavers

1247 search results - page 31 / 250
» Designing Secure Wireless Mobile Ad Hoc Networks
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
ADHOC
2007
134views more  ADHOC 2007»
14 years 9 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
CN
2002
169views more  CN 2002»
14 years 9 months ago
A new wireless ad hoc multicast routing protocol
An ad hoc network is a multi-hop wireless network of mobile nodes without the intervention of fixed infrastructure. Limited bandwidth and mobility require that ad hoc routing prot...
Seungjoon Lee, Chongkwon Kim
TDSC
2010
157views more  TDSC 2010»
14 years 4 months ago
On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures
Network survivability is the ability of a network keeping connected under failures and attacks, which is a fundamental issue to the design and performance evaluation of wireless ad...
Fei Xing, Wenye Wang
ICDCSW
2003
IEEE
15 years 3 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako