Sciweavers

1862 search results - page 15 / 373
» Secure Routing for Mobile Ad Hoc Networks
Sort
View
104
Voted
ACSAC
2004
IEEE
15 years 4 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
ESAS
2006
Springer
15 years 4 months ago
Impact of Pseudonym Changes on Geographic Routing in VANETs
Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). In these so called vehicular ad hoc networks (VANETs) security and priv...
Elmar Schoch, Frank Kargl, Tim Leinmüller, St...
175
Voted
MOBIHOC
2000
ACM
15 years 4 months ago
Neighbor supporting ad hoc multicast routing protocol
—An ad hoc network is a multi-hop wireless network formed by a collection of mobile nodes without the intervention of fixed infrastructure. Limited bandwidth and a high degree o...
Seungjoon Lee, Chongkwon Kim
100
Voted
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 6 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
103
Voted
ACIIDS
2009
IEEE
108views Database» more  ACIIDS 2009»
15 years 7 months ago
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
Abstract—Wireless sensor networks(WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low c...
Zhongwei Zhang, Hong Zhou, Jason Gao