Sciweavers

675 search results - page 18 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
IJSNET
2007
91views more  IJSNET 2007»
13 years 8 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
WOWMOM
2005
ACM
195views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Adaptive Routing for Intermittently Connected Mobile Ad Hoc Networks
The vast majority of mobile ad hoc networking research makes a very large assumption: that communication can only take place between nodes that are simultaneously accessible withi...
Mirco Musolesi, Stephen Hailes, Cecilia Mascolo
GLOBECOM
2009
IEEE
13 years 6 months ago
Secure Unified Cellular Ad Hoc Network Routing
Abstract--Previous simulations have shown substantial performance gains can be achieved by using hybrid cellular and wireless LAN (WLAN) approaches [1]. In a hybrid system, a proxy...
Jason J. Haas, Yih-Chun Hu
ICDCSW
2003
IEEE
14 years 1 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako
ESAS
2007
Springer
14 years 2 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...