Sciweavers

235 search results - page 22 / 47
» Secure Routing and Intrusion Detection in Ad Hoc Networks
Sort
View
FGCN
2007
IEEE
127views Communications» more  FGCN 2007»
14 years 2 months ago
A Survey of Routing Protocols for Energy Constrained Ad Hoc Wireless Networks
In this survey we review energy-aware routing protocols for wireless multihop ad hoc networks and critically discuss the main results in this area. The classification presented is...
Natalia Vassileva, Francisco Barceló-Arroyo
WWIC
2007
Springer
221views Communications» more  WWIC 2007»
14 years 1 months ago
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malici...
Oscar F. Gonzalez, Michael P. Howarth, George Pavl...
INFOCOM
2005
IEEE
14 years 1 months ago
HADOF: defense against routing disruptions in mobile ad hoc networks
— HADOF is a set of mechanisms to defend against routing disruptions in mobile ad hoc networks. Based on the observed behavior and the history record of each node, HADOF aims to ...
Wei Yu, Yan Sun, K. J. Ray Liu
CN
2006
115views more  CN 2006»
13 years 7 months ago
MuSeQoR: Multi-path failure-tolerant security-aware QoS routing in Ad hoc wireless networks
In this paper, we present MuSeQoR: a new multi-path routing protocol that tackles the twin issues of reliability (protection against failures of multiple paths) and security, whil...
Tamma Bheemarjuna Reddy, S. Sriram, B. S. Manoj, C...
MSWIM
2005
ACM
14 years 1 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....