Sciweavers

1624 search results - page 200 / 325
» Requirements for Privacy-Enhancements in Mobile Ad Hoc Netwo...
Sort
View
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 8 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
SASN
2003
ACM
15 years 6 months ago
A cooperative intrusion detection system for ad hoc networks
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerab...
Yi-an Huang, Wenke Lee
ADHOCNOW
2003
Springer
15 years 6 months ago
Space-Time Routing in Ad Hoc Networks
We introduce Space-Time Routing (STR), a new approach to routing in mobile ad hoc networks. In STR, the age of routing state is considered jointly with the distance to the destinat...
Henri Dubois-Ferrière, Matthias Grossglause...
IFIP
2009
Springer
15 years 8 months ago
A Calculus of Trustworthy Ad Hoc Networks
We propose a process calculus for mobile ad hoc networks which embodies a behaviour-based multilevel decentralised trust model. Our trust model supports both direct trust, by monit...
Massimo Merro, Eleonora Sibilio
INFOCOM
2008
IEEE
15 years 8 months ago
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
—We argue that the traditional notion of trust as a relation among entities, while useful, becomes insufficient for emerging data-centric mobile ad hoc networks. In these system...
Maxim Raya, Panagiotis Papadimitratos, Virgil D. G...