Sciweavers

2691 search results - page 40 / 539
» Securing Ad Hoc Networks
Sort
View
BROADNETS
2006
IEEE
15 years 6 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...
MSN
2005
Springer
251views Sensor Networks» more  MSN 2005»
15 years 5 months ago
ZBMRP: A Zone Based Multicast Routing Protocol for Mobile Ad Hoc Networks
In this paper, we propose a Multicast Routing Protocol termed ZBMRP (Zone Based Multicast Routing Protocol) for Mobile Ad Hoc Networks (MANETs). ZBMRP applies on-demand procedures ...
Jieying Zhou, Simeng Wang, Jing Deng, Hongda Feng
NDSS
2002
IEEE
15 years 4 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
ITCC
2005
IEEE
15 years 5 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
GI
2004
Springer
15 years 5 months ago
Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks
: Ad hoc networking with Bluetooth requires an efficient way of discovering neighbor devices. Based on real-world measurements and simulations we are deriving optimal parameters f...
Diego Bohman, Matthias Frank, Peter Martini, Chris...