Sciweavers

1558 search results - page 35 / 312
» Mobility helps security in ad hoc networks
Sort
View
ESAS
2007
Springer
15 years 6 months ago
Key Establishment in Heterogeneous Self-organized Networks
Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a sin...
Gelareh Taban, Reihaneh Safavi-Naini
MOBIHOC
2000
ACM
15 years 4 months ago
Neighbor supporting ad hoc multicast routing protocol
—An ad hoc network is a multi-hop wireless network formed by a collection of mobile nodes without the intervention of fixed infrastructure. Limited bandwidth and a high degree o...
Seungjoon Lee, Chongkwon Kim
ESAS
2004
Springer
15 years 3 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
NCA
2003
IEEE
15 years 5 months ago
AdHocFS: Sharing Files in WLANs
This paper presents the ADHOCFS file system for mobile users, which realizes transparent, adaptive file access according to the users’ specific situations (e.g., device in us...
Malika Boulkenafed, Valérie Issarny
PERCOM
2007
ACM
15 years 11 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...