Sciweavers

88 search results - page 6 / 18
» Impact of denial of service attacks on ad hoc networks
Sort
View
CN
2007
172views more  CN 2007»
13 years 7 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
EUROMICRO
2004
IEEE
13 years 11 months ago
Securing Ad hoc Routing Protocols
Ad hoc networks are subject of many recent research efforts. Especially in mobile scenarios, self-organizing networks are of high interest. While the routing aspects of mobile ad ...
Frank Kargl, Stefan Schlott, Andreas Klenk, Alfred...
AINA
2011
IEEE
12 years 11 months ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor
ICC
2007
IEEE
206views Communications» more  ICC 2007»
14 years 2 months ago
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
— In this paper, we present a novel anonymous secure routing protocol for mobile ad hoc networks (MANETs). The proposed protocol not only provides anonymity from all the intermed...
Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho,...
WONS
2005
IEEE
14 years 1 months ago
Evaluation of Service Discovery Architectures for Mobile Ad Hoc Networks
Discovery of services and other named resources is expected to be a crucial feature for the usability of mobile ad-hoc networks (MANETs). Different types of service discovery arch...
Paal Engelstad, Yan Zheng