Sciweavers

1835 search results - page 13 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 4 months ago
Cross-layer Networking for Peer Databases over Wireless Ad-Hoc Communities
— Recent advances in wireless technology as well as in electronics industry have given rise to the widespread of wireless ad-hoc networking. Expanding data-centric applications t...
Evangelos Papapetrou, Efthymia Rova, Apostolos Zar...
WS
2003
ACM
15 years 2 months ago
Rushing attacks and defense in wireless ad hoc network routing protocols
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many ...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
MOBIHOC
2001
ACM
15 years 9 months ago
The quest for security in mobile ad hoc networks
So far, research on mobile ad hoc networks has been focused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an overv...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
PEWASUN
2004
ACM
15 years 3 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
ICDCSW
2000
IEEE
15 years 2 months ago
Fisheye State Routing in Mobile Ad Hoc Networks
In this paper, we present a novel routing protocol for wireless ad hoc networks – Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce ...
Guangyu Pei, Mario Gerla, Tsu-Wei Chen