Sciweavers

766 search results - page 7 / 154
» Securing Ad hoc Routing Protocols
Sort
View
ICWN
2004
15 years 12 days ago
Securing Data Transmissions and Retransmissions Management in Ad Hoc Networks
We present in this paper a solution exploiting existence of multiple paths between nodes to secure data in Ad hoc networks. This solution is also designed in the aim to give the ne...
Souheila Bouam, Jalel Ben-Othman
ACNS
2004
Springer
142views Cryptology» more  ACNS 2004»
15 years 4 months ago
S-RIP: A Secure Distance Vector Routing Protocol
Distance vector routing protocols (e.g., RIP) have been widely used on the Internet, and are being adapted to emerging wireless ad hoc networks. However, it is well-known that exis...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
ADHOC
2007
133views more  ADHOC 2007»
14 years 11 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
142
Voted
PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 11 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
60
Voted
ICCS
2007
Springer
15 years 5 months ago
Energy Efficient Forwarding Scheme for Secure Wireless Ad Hoc Routing Protocols
Kwonseung Shin, Min Young Chung, Hyunseung Choo