Sciweavers

85 search results - page 6 / 17
» Distance Hijacking Attacks on Distance Bounding Protocols
Sort
View
ICICS
2004
Springer
14 years 23 days ago
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
JACM
2002
163views more  JACM 2002»
13 years 7 months ago
Formal verification of standards for distance vector routing protocols
We show how to use an interactive theorem prover, HOL, together with a model checker, SPIN, to prove key properties of distance vector routing protocols. We do three case studies: ...
Karthikeyan Bhargavan, Davor Obradovic, Carl A. Gu...
MUE
2008
IEEE
218views Multimedia» more  MUE 2008»
14 years 1 months ago
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks
Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of centralized access point. Secure Efficient Ad hoc...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
TPDS
2008
130views more  TPDS 2008»
13 years 7 months ago
Detecting VoIP Floods Using the Hellinger Distance
Voice over IP (VoIP), also known as Internet telephony, is gaining market share rapidly and now competes favorably as one of the visible applications of the Internet. Nevertheless,...
Hemant Sengar, Haining Wang, Duminda Wijesekera, S...
IPL
2006
104views more  IPL 2006»
13 years 7 months ago
The communication complexity of the Hamming distance problem
We investigate the randomized and quantum communication complexity of the HAMMING DISTANCE problem, which is to determine if the Hamming distance between two n-bit strings is no l...
Wei Huang, Yaoyun Shi, Shengyu Zhang, Yufan Zhu