Sciweavers

235 search results - page 18 / 47
» Secure Routing and Intrusion Detection in Ad Hoc Networks
Sort
View
WS
2003
ACM
14 years 1 months ago
Rushing attacks and defense in wireless ad hoc network routing protocols
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many ...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
MSN
2005
Springer
251views Sensor Networks» more  MSN 2005»
14 years 1 months ago
ZBMRP: A Zone Based Multicast Routing Protocol for Mobile Ad Hoc Networks
In this paper, we propose a Multicast Routing Protocol termed ZBMRP (Zone Based Multicast Routing Protocol) for Mobile Ad Hoc Networks (MANETs). ZBMRP applies on-demand procedures ...
Jieying Zhou, Simeng Wang, Jing Deng, Hongda Feng
ICPPW
2005
IEEE
14 years 1 months ago
A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks
— In a typical mobile ad hoc network, mobile computing devices wander autonomously and communicate via temporary links in a self-organized computing system without any central ad...
Zhi Li, Yu-Kwong Kwok
ICPPW
2003
IEEE
14 years 1 months ago
Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network
The mobile ad hoc network (MANET), which is characterized by an infrastructureless architecture and multi-hop communication, has attracted a lot of attention recently. In the evol...
Yu-Chee Tseng, Jehn-Ruey Jiang, Jih-Hsin Lee
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 8 months ago
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad ho...
Sugata Sanyal, Dhaval Gada, Rajat Gogri, Punit Rat...