Sciweavers

1862 search results - page 9 / 373
» Secure Routing for Mobile Ad Hoc Networks
Sort
View
JSAC
2006
114views more  JSAC 2006»
15 years 15 days ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu
105
Voted
ADHOCNOW
2008
Springer
15 years 7 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
90
Voted
ADHOC
2007
91views more  ADHOC 2007»
15 years 20 days ago
Non-interactive key establishment in mobile ad hoc networks
We present a new non-interactive key agreement and progression (NIKAP) scheme for mobile ad hoc networks (MANETs), which does not require an on-line centralized authority, can non...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
122
Voted
JNW
2006
149views more  JNW 2006»
15 years 15 days ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
150
Voted
CORR
2010
Springer
432views Education» more  CORR 2010»
15 years 19 days ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen