Sciweavers

472 search results - page 61 / 95
» The security of vehicular ad hoc networks
Sort
View
204
Voted
ITCC
2005
IEEE
15 years 6 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
110
Voted
MOBIQUITOUS
2005
IEEE
15 years 6 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
103
Voted
ACIIDS
2009
IEEE
108views Database» more  ACIIDS 2009»
15 years 7 months ago
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
Abstract—Wireless sensor networks(WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low c...
Zhongwei Zhang, Hong Zhou, Jason Gao
TIFS
2010
130views more  TIFS 2010»
14 years 7 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
117
Voted
WCNC
2010
IEEE
15 years 4 months ago
META: A Mobility Model of MEtropolitan TAxis Extracted from GPS Traces
In this paper, we present our study of extracting a mobility model for vehicular ad hoc networks (VANETs) from a large amount of real taxi GPS trace data. In order to capture char...
Hongyu Huang, Yanmin Zhu, Xu Li, Minglu Li, Min-Yo...