Sciweavers

472 search results - page 66 / 95
» The security of vehicular ad hoc networks
Sort
View
120
Voted
BIOWIRE
2007
Springer
15 years 6 months ago
Bio-Inspired Multi-agent Collaboration for Urban Monitoring Applications
Vehicular sensor networks (VSNs) provide a collaborative sensing environment where mobile vehicles equipped with sensors of different nature (from chemical detectors to still/video...
Uichin Lee, Eugenio Magistretti, Mario Gerla, Paol...
91
Voted
MDM
2007
Springer
148views Communications» more  MDM 2007»
15 years 6 months ago
Enforcing Data Integrity in Very Large Ad Hoc Networks
Ad hoc networks rely on nodes forwarding each other’s packets, making trust and cooperation key issues for ensuring network performance. As long as all nodes in the network belo...
Daniela Gavidia, Maarten van Steen
100
Voted
GLOBECOM
2006
IEEE
15 years 6 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
103
Voted
JSAC
2006
111views more  JSAC 2006»
15 years 15 days ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
153
Voted
JDCTA
2010
150views more  JDCTA 2010»
14 years 7 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao