Sciweavers

177 search results - page 20 / 36
» Trust Enhanced Secure Mobile Ad-Hoc Network Routing
Sort
View
JUCS
2007
164views more  JUCS 2007»
14 years 9 months ago
An Adaptive Hierarchical Extension of DSR: The Cluster Source Routing
: Numerous studies have shown the difficulty for a single routing protocol to scale with respect to mobility and network size in wireless ad hoc networks. This paper presents a clu...
Farid Jaddi, Béatrice Paillassa
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 3 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli
IEEEARES
2008
IEEE
15 years 4 months ago
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks
— Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for diffe...
Amir R. Khakpour, Maryline Laurent-Maknavicius, Ha...
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
14 years 11 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
ICPPW
2002
IEEE
15 years 2 months ago
System Services for Implementing Ad-Hoc Routing Protocols
This paper explores several systems issues regarding the implementation of routing protocols for mobile ad-hoc networks. It proclaims that support for on-demand routing is insufï¬...
Vikas Kawadia, Yongguang Zhang, Binita Gupta