Sciweavers

177 search results - page 19 / 36
» Trust Enhanced Secure Mobile Ad-Hoc Network Routing
Sort
View
WS
2003
ACM
15 years 3 months ago
Rushing attacks and defense in wireless ad hoc network routing protocols
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many ...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
ADHOCNOW
2008
Springer
15 years 4 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
ISCC
2000
IEEE
151views Communications» more  ISCC 2000»
15 years 2 months ago
Connection-Oriented Routing in Ad Hoc Networks Based on Dynamic Group Infrastructure
An ad hoc network is formed by a group of mobile hosts communicating over wireless channels. Such a network operates without any fixed network interaction and centralized administ...
Yu-Liang Chang, Ching-Chi Hsu
INFOCOM
2010
IEEE
14 years 8 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
15 years 3 months ago
Secure Dynamic Source Routing
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...