Sciweavers

225 search results - page 29 / 45
» Inherent Security of Routing Protocols in Ad-Hoc and Sensor ...
Sort
View
ESAS
2004
Springer
14 years 28 days ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk
ISCC
2006
IEEE
190views Communications» more  ISCC 2006»
14 years 1 months ago
Time-Critical Underwater Sensor Diffusion with No Proactive Exchanges and Negligible Reactive Floods
— In this paper we study multi-hop ad hoc routing in a scalable Underwater Sensor Network (UWSN), which is a novel network paradigm for ad hoc investigation of the world below th...
Uichin Lee, Jiejun Kong, Joon-Sang Park, Eugenio M...
AHSWN
2006
206views more  AHSWN 2006»
13 years 7 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
VTC
2010
IEEE
242views Communications» more  VTC 2010»
13 years 5 months ago
A Cross-Layer Design Based on Geographic Information for Cooperative Wireless Networks
—Most of geographic routing approaches in wireless ad hoc and sensor networks do not take into consideration the medium access control (MAC) and physical layers when designing a ...
Teck Aguilar, Mohamed Chedly Ghedira, Syue-Ju Syue...
SASN
2003
ACM
14 years 24 days ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...