Sciweavers

126 search results - page 9 / 26
» Defense against Routing Disruption Attacks in Mobile Ad Hoc ...
Sort
View
GLOBECOM
2007
IEEE
14 years 1 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
INFOCOM
2003
IEEE
14 years 23 days ago
Cooperative Packet Caching and Shortest Multipath Routing in Mobile Ad hoc Networks
- A mobile ad hoc network is an autonomous system of infrastructureless, multihop wireless mobile nodes. Reactive routing protocols perform well in such an environment due to their...
Alvin C. Valera, Winston Khoon Guan Seah, S. V. Ra...
JSAC
2006
136views more  JSAC 2006»
13 years 7 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas
JCM
2008
121views more  JCM 2008»
13 years 7 months ago
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks
In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nod...
Yihui Zhang, Li Xu, Xiaoding Wang
MSWIM
2005
ACM
14 years 1 months ago
Towards resilient geographic routing in WSNs
In this paper, we consider the security of geographical forwarding (GF) – a class of algorithms widely used in ad hoc and sensor networks. In GF, neighbors exchange their locati...
Nael B. Abu-Ghazaleh, Kyoung-Don Kang, Ke Liu