Sciweavers

170 search results - page 6 / 34
» Prohibitive-link Detection and Routing Protocol
Sort
View
VISUALIZATION
2002
IEEE
15 years 4 months ago
Case Study: Interactive Visualization for Internet Security
Internet connectivity is defined by a set of routing protocols which let the routers that comprise the Internet backbone choose the best route for a packet to reach its destinati...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Xia...
94
Voted
ACSAC
2004
IEEE
15 years 3 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
ADHOC
2007
133views more  ADHOC 2007»
14 years 11 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
96
Voted
DSN
2002
IEEE
15 years 4 months ago
Detection of Invalid Routing Announcement in the Internet
Network measurement has shown that a specific IP address prefix may be announced by more than one autonomous system (AS), a phenomenon commonly referred to as Multiple Origin AS...
Xiaoliang Zhao, Dan Pei, Lan Wang, Daniel Massey, ...
SENSYS
2006
ACM
15 years 5 months ago
Lazy cross-link removal for geographic routing
Geographic techniques promise highly scalable any-toany routing in wireless sensor networks. In one thread of research on geographic routing, researchers have explored robust, dis...
Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott S...