Sciweavers

1862 search results - page 37 / 373
» Routing and Security in Mobile Ad Hoc Networks
Sort
View
JSAC
2006
156views more  JSAC 2006»
14 years 11 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
AINA
2006
IEEE
15 years 3 months ago
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
Due to the nature of radio transmissions, communications in wireless networks are easy to capture and analyze. Next to this, privacy enhancing techniques (PETs) proposed for wired...
Stefaan Seys, Bart Preneel
INFOCOM
2002
IEEE
15 years 4 months ago
On the scalability of ad hoc routing protocols
— A novel framework is presented for the study of scalability in ad hoc networks. Using this framework, the first asymptotic analysis is provided with respect to network size, m...
Cesar A. Santivanez, A. Bruce McDonald, Ioannis St...
ISCC
2005
IEEE
15 years 5 months ago
Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing
Jiejun Kong, Xiaoyan Hong, M. Y. Sanadidi, Mario G...
ENTCS
2007
131views more  ENTCS 2007»
14 years 11 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo