Sciweavers

1558 search results - page 33 / 312
» Mobility helps security in ad hoc networks
Sort
View
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 6 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
ADHOC
2005
122views more  ADHOC 2005»
14 years 11 months ago
Maintaining weakly-connected dominating sets for clustering ad hoc networks
An ad hoc network is a multihop wireless communication network supporting mobile users. Network performance degradation is a major problem as the network becomes larger. Clusterin...
Yuanzhu Peter Chen, Arthur L. Liestman
GLOBECOM
2007
IEEE
15 years 6 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
JNW
2006
117views more  JNW 2006»
14 years 11 months ago
An Obstacle Based Realistic Ad-Hoc Mobility Model for Social Networks
P. Venkateswaran, Rahul Ghosh, Aritra Das, S. K. S...
CCS
2008
ACM
15 years 1 months ago
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe ...
Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig,...