Sciweavers

766 search results - page 8 / 154
» Securing Ad hoc Routing Protocols
Sort
View
TISSEC
2008
80views more  TISSEC 2008»
15 years 4 months ago
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
Baruch Awerbuch, Reza Curtmola, David Holmer, Cris...
NOMS
2006
IEEE
134views Communications» more  NOMS 2006»
15 years 10 months ago
Evaluation of QoS Metrics in Ad Hoc Networks with the use of Secure Routing Protocols
Darlan Vivian, Eduardo Adílio Pelinson Alch...
ACMSE
2004
ACM
15 years 10 months ago
Trust based adaptive on demand ad hoc routing protocol
In this paper, we propose a routing protocol that is based on securing the routing information from unauthorized users. Even though routing protocols of this category are already ...
Rajiv K. Nekkanti, Chung-wei Lee
JNW
2006
149views more  JNW 2006»
15 years 4 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
IJSNET
2007
91views more  IJSNET 2007»
15 years 4 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...