Sciweavers

69 search results - page 11 / 14
» Detecting Impersonation Attacks in Future Wireless and Mobil...
Sort
View
INFOCOM
2006
IEEE
14 years 22 days ago
Secure Localization with Hidden and Mobile Base Stations
— Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed t...
Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
DEXAW
2004
IEEE
90views Database» more  DEXAW 2004»
13 years 10 months ago
Opportunistic Dissemination of Spatio-Temporal Resource Information in Mobile Peer to Peer Networks
In this paper we examine the dissemination of availability reports about resources in mobile peer-topeer networks, where vehicles, pedestrian or sensors communicate with each othe...
Ouri Wolfson, Bo Xu
PERCOM
2005
ACM
14 years 6 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
INFOCOM
2005
IEEE
14 years 9 days ago
HADOF: defense against routing disruptions in mobile ad hoc networks
— HADOF is a set of mechanisms to defend against routing disruptions in mobile ad hoc networks. Based on the observed behavior and the history record of each node, HADOF aims to ...
Wei Yu, Yan Sun, K. J. Ray Liu
CORR
2006
Springer
206views Education» more  CORR 2006»
13 years 6 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski