Sciweavers

112 search results - page 9 / 23
» Secure long term communities in ad hoc networks
Sort
View
MDM
2007
Springer
148views Communications» more  MDM 2007»
15 years 5 months ago
Enforcing Data Integrity in Very Large Ad Hoc Networks
Ad hoc networks rely on nodes forwarding each other’s packets, making trust and cooperation key issues for ensuring network performance. As long as all nodes in the network belo...
Daniela Gavidia, Maarten van Steen
WS
2003
ACM
15 years 5 months ago
Rushing attacks and defense in wireless ad hoc network routing protocols
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many ...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 6 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
MSN
2005
Springer
251views Sensor Networks» more  MSN 2005»
15 years 5 months ago
ZBMRP: A Zone Based Multicast Routing Protocol for Mobile Ad Hoc Networks
In this paper, we propose a Multicast Routing Protocol termed ZBMRP (Zone Based Multicast Routing Protocol) for Mobile Ad Hoc Networks (MANETs). ZBMRP applies on-demand procedures ...
Jieying Zhou, Simeng Wang, Jing Deng, Hongda Feng
WISEC
2009
ACM
15 years 6 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz