Sciweavers

777 search results - page 12 / 156
» On Secure Mobile Ad hoc Routing
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
ICICS
2004
Springer
14 years 1 months ago
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
KIVS
2005
Springer
14 years 1 months ago
Establishing P2P-Overlays for Ad Hoc Networks Using Provider Subscription
Multi-hop ad hoc networks are envisioned to be an integral part of future mobile networks. Today, however, ad hoc networks lack the necessary resilience and reliability. This work ...
Tronje Krop, Martin Kappes, Matthias Hollick
JSAC
2006
136views more  JSAC 2006»
13 years 7 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas
TON
2008
204views more  TON 2008»
13 years 7 months ago
BRA: a bidirectional routing abstraction for asymmetric mobile ad hoc networks
idirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks Venugopalan Ramasubramanian and Daniel Moss
Venugopalan Ramasubramanian, Daniel Mossé