Sciweavers

1123 search results - page 144 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
JNCA
2007
128views more  JNCA 2007»
15 years 4 months ago
Embedded web server-based home appliance networks
Powerful microcontrollers are used as parts of most home and office appliances of today. Integrating web servers to these intelligent devices will aid in controlling them over th...
M. Can Filibeli, Öznur Özkasap, M. Reha ...
CACM
2008
84views more  CACM 2008»
15 years 4 months ago
The emergence of a networking primitive in wireless sensor networks
The wireless sensor network community approached netabstractions as an open question, allowing answers to emerge with time and experience. The Trickle algorithm has become a basic...
Philip Levis, Eric A. Brewer, David E. Culler, Dav...
ACISP
2006
Springer
15 years 8 months ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
PERCOM
2009
ACM
16 years 5 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi
JSAC
2006
156views more  JSAC 2006»
15 years 4 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson