Sciweavers

472 search results - page 28 / 95
» The security of vehicular ad hoc networks
Sort
View
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 5 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
115
Voted
IJNSEC
2006
205views more  IJNSEC 2006»
15 years 16 days ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
120
Voted
CORR
2010
Springer
183views Education» more  CORR 2010»
15 years 19 days ago
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks
-- In cluster-based routing protocol (CBRP), two-level hierarchical structure is successfully used to reduce over-flooding in wireless ad hoc networks. As it is vulnerable to a sin...
Alok Ojha, Hongmei Deng, Dharma P. Agrawal, Sugata...
ICDCSW
2005
IEEE
15 years 6 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
ICNS
2009
IEEE
15 years 7 months ago
Security Solution for Mobile Ad Hoc Network of Networks (MANoN)
Ali H. Al-Bayatti, Hussein Zedan, Antonio Cau