Sciweavers

1165 search results - page 35 / 233
» Secure data communication in mobile ad hoc networks
Sort
View
ISCC
2005
IEEE
15 years 5 months ago
Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing
Jiejun Kong, Xiaoyan Hong, M. Y. Sanadidi, Mario G...
AHSWN
2006
206views more  AHSWN 2006»
14 years 12 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
MOBICOM
1999
ACM
15 years 4 months ago
Query Localization Techniques for On-Demand Routing Protocols in ad hoc Networks
Mobile ad hoc networks are characterized by multi-hop wireless links, absence of any cellular infrastructure, and frequent host mobility. Design of efficient routing protocols in ...
Robert Castañeda, Samir Ranjan Das
WCNC
2008
IEEE
15 years 6 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...
GLOBECOM
2007
IEEE
15 years 6 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...