Sciweavers

735 search results - page 17 / 147
» On the scalability of ad hoc routing protocols
Sort
View
WONS
2005
IEEE
15 years 5 months ago
Secure Multipath Routing for Mobile Ad Hoc Networks
Multipath routing minimizes the consequences of security attacks deriving from collaborating malicious nodes in MANET, by maximizing the number of nodes that an adversary must com...
Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos...
AINA
2008
IEEE
15 years 6 months ago
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secu...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
IWDC
2005
Springer
139views Communications» more  IWDC 2005»
15 years 5 months ago
A New Routing Protocol in Ad Hoc Networks with Unidirectional Links
Most of the proposed algorithms in ad hoc networks assume homogeneous nodes with similar transmission range and capabilities. However, in heterogeneous ad hoc network, it is not ne...
Deepesh Man Shrestha, Young-Bae Ko
ICNP
2002
IEEE
15 years 4 months ago
A Secure Routing Protocol for Ad Hoc Networks
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protoc...
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine...
PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 11 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...