Sciweavers

1862 search results - page 287 / 373
» Secure Routing for Mobile Ad Hoc Networks
Sort
View
89
Voted
PERCOM
2004
ACM
16 years 10 days ago
Wi-Fi in Ad Hoc Mode: A Measurement Study
In this paper we investigate the performance of IEEE 802.11b ad hoc networks by means of an experimental study. This analysis reveals several aspects that are usually neglected in...
Giuseppe Anastasi, Eleonora Borgia, Marco Conti, E...
WICOMM
2008
139views more  WICOMM 2008»
15 years 19 days ago
Struggling against selfishness and black hole attacks in MANETs
Since mobile ad hoc networks (MANETs) are infrastructureless and multi-hop by nature, transmitting packets from any node to another usually relies on services provided by intermed...
Djamel Djenouri, Nadjib Badache
132
Voted
MASS
2010
140views Communications» more  MASS 2010»
14 years 10 months ago
InterMR: Inter-MANET routing in heterogeneous MANETs
The advancements of diverse radio technologies and emerging applications have spawned increasing heterogeneity in mobile ad hoc networks (MANETs). But the collaborative nature of c...
Seung-Hoon Lee, Starsky H. Y. Wong, Chi-Kin Chau, ...
104
Voted
JSAC
2006
111views more  JSAC 2006»
15 years 21 days ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
154
Voted
JDCTA
2010
150views more  JDCTA 2010»
14 years 7 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao