Sciweavers

177 search results - page 11 / 36
» Ad hoc on-demand distance-vector routing scalability
Sort
View
GLOBECOM
2006
IEEE
14 years 1 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
SASN
2003
ACM
14 years 19 days ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
ICNS
2007
IEEE
14 years 1 months ago
A Routing Based Service Discovery Protocol for Ad hoc Networks
: Ad hoc networks are networks that consist of wireless mobile nodes. They are networks that do not require any preestablished infrastructure. Their ability to quickly and dynamica...
Abdel Obaid, Azeddine Khir, Hafedh Mili
ICC
2009
IEEE
167views Communications» more  ICC 2009»
14 years 2 months ago
QoS Enhancement and Performance Evaluation of Ad-Hoc Routing Protocols for Rural Public Safety
—In this paper, we explore the feasibility of using Mobile Ad-hoc Networks (MANETs) for rural public safety. First, we discuss a QoS enhancement to a standard routing protocol, D...
Chad Bohannan, Li Zhang, Jian Tang, Richard S. Wol...
ICCCN
2007
IEEE
14 years 1 months ago
Safeguarding Mutable Fields in AODV Route Discovery Process
— Assuring cryptographic integrity of mutable fields in any on-demand ad hoc routing protocol is more challenging than that of non mutable fields. We propose an efficient auth...
Kulasekaran A. Sivakumar, Mahalingam Ramkumar