Sciweavers

851 search results - page 13 / 171
» Secure Mobile Agents on Ad Hoc Wireless Networks
Sort
View
76
Voted
ICWN
2003
14 years 10 months ago
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point ...
Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantarad...
ADHOCNOW
2006
Springer
15 years 3 months ago
Threats to Security in DSRC/WAVE
Dedicated Short Range Communications (DSRC) enabled road vehicles are on the brink of actualizing an important application of mobile ad hoc networks. It is crucial that the message...
Christine Laurendeau, Michel Barbeau
EUC
2005
Springer
15 years 3 months ago
Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks
Wireless Ad Hoc networks are particularly vulnerable due to their fundamental characteristics such as an open medium, dynamic topology, distributed cooperation and constrained capa...
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Le...
GLOBECOM
2008
IEEE
14 years 10 months ago
A Framework for Dual-Agent MANET Routing Protocols
— Nodes forming mobile ad hoc networks (MANET) nodes can be logically partitioned into 1) a selfish user agent serving the interests of the end user (owner) of the mobile device...
Brian L. Gaines, Mahalingam Ramkumar
ADHOCNOW
2005
Springer
15 years 3 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves