Sciweavers

796 search results - page 92 / 160
» Secure Multipath Routing for Mobile Ad Hoc Networks
Sort
View
SUTC
2006
IEEE
15 years 3 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
WWIC
2007
Springer
182views Communications» more  WWIC 2007»
15 years 3 months ago
Multicast Overlay Spanning Tree Protocol for Ad Hoc Networks
In this paper we present an extension to the OLSR unicast routing protocol to support multicast routing in mobile ad hoc networks. The proposed protocol is based on Multicast Overl...
Georgios Rodolakis, Amina Meraihi Naimi, Anis Laou...
ICOIN
2005
Springer
15 years 3 months ago
A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks
Abstract. Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most...
Seongil Hahm, Yongjae Jung, Seunghee Yi, Yukyoung ...
ADHOCNETS
2009
Springer
15 years 2 months ago
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion ...
Sevil Sen, John A. Clark, Juan E. Tapiador
ICDCSW
2007
IEEE
15 years 4 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...