Sciweavers

189 search results - page 10 / 38
» MARS: Misbehavior Detection in Ad Hoc Networks
Sort
View
ADHOCNOW
2006
Springer
15 years 3 months ago
Initialization for Ad Hoc Radio Networks with Carrier Sensing and Collision Detection
We consider an ad-hoc network consisting of devices that try to gain access for transmission through a shared communication channel. We redesign randomized protocol of Cai, Lu and ...
Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada
MOBIHOC
2002
ACM
15 years 9 months ago
Weak duplicate address detection in mobile ad hoc networks
Auto-configuration is a desirable goal in implementing mobile ad hoc networks. Specifically, automated dynamic assignment (without manual intervention) of IP addresses is desirabl...
Nitin H. Vaidya
ICC
2007
IEEE
354views Communications» more  ICC 2007»
15 years 4 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen
AINA
2008
IEEE
15 years 4 months ago
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secu...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
INFOCOM
2003
IEEE
15 years 2 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson