Sciweavers

1862 search results - page 10 / 373
» Routing and Security in Mobile Ad Hoc Networks
Sort
View
INFOCOM
2003
IEEE
15 years 4 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
IFIP
2003
Springer
15 years 4 months ago
On Demand Network Level Service Deployment in Ad Hoc Networks
Many network level services such as routing, auto-addressing and, security have been proposed for ad hoc networks. Each has characteristics that may cause it to outperform similar ...
Daniel Prince, Andrew Scott, W. D. Shepherd
WS
2003
ACM
15 years 4 months ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas
WS
2003
ACM
15 years 4 months ago
Rushing attacks and defense in wireless ad hoc network routing protocols
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many ...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
TON
2008
204views more  TON 2008»
14 years 11 months ago
BRA: a bidirectional routing abstraction for asymmetric mobile ad hoc networks
idirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks Venugopalan Ramasubramanian and Daniel Moss
Venugopalan Ramasubramanian, Daniel Mossé