Sciweavers

766 search results - page 26 / 154
» Securing Ad hoc Routing Protocols
Sort
View
MOBIHOC
2001
ACM
15 years 10 months ago
The quest for security in mobile ad hoc networks
So far, research on mobile ad hoc networks has been focused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an overv...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
ADHOCNETS
2009
Springer
15 years 5 months ago
Buckshot Routing - A Robust Source Routing Protocol for Dense Ad-Hoc Networks
Experiments with wireless sensor networks have shown that unidirectional communication links are quite common. What is even more, they have also shown that the range of a unidirect...
David Peters, Reinhardt Karnapke, Jörg Nolte
INFOCOM
2000
IEEE
15 years 3 months ago
Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks
Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. We compare the perf...
Samir Ranjan Das, Charles E. Perkins, Elizabeth M....
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 5 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
ICWN
2004
15 years 14 days ago
Sustaining Performance Under Traffic Overload
In this paper, we investigate the performance of wireless ad hoc networks with traffic loads beyond saturation. While it is desirable to operate a network below saturation, an ad h...
Saman Desilva, Rajendra V. Boppana