Sciweavers

21 search results - page 4 / 5
» Origin authentication in interdomain routing
Sort
View
JCM
2008
121views more  JCM 2008»
13 years 6 months ago
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks
In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nod...
Yihui Zhang, Li Xu, Xiaoding Wang
IEEEARES
2006
IEEE
14 years 8 days ago
Censorship-Resistant and Anonymous P2P Filesharing
We present a P2P filesharing system that allows redundant storage of shared files in a way that no participating server ever stores data that could compromise its operator. Inst...
Regine Endsuleit, Thilo Mie
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
14 years 5 days ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
ENTCS
2006
173views more  ENTCS 2006»
13 years 6 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
ICNP
2006
IEEE
14 years 8 days ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...