Sciweavers

235 search results - page 26 / 47
» Secure Routing and Intrusion Detection in Ad Hoc Networks
Sort
View
ACIIDS
2009
IEEE
108views Database» more  ACIIDS 2009»
14 years 2 months ago
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
Abstract—Wireless sensor networks(WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low c...
Zhongwei Zhang, Hong Zhou, Jason Gao
ADHOC
2007
91views more  ADHOC 2007»
13 years 8 months ago
Non-interactive key establishment in mobile ad hoc networks
We present a new non-interactive key agreement and progression (NIKAP) scheme for mobile ad hoc networks (MANETs), which does not require an on-line centralized authority, can non...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
HICSS
2005
IEEE
137views Biometrics» more  HICSS 2005»
14 years 1 months ago
Sliding Window Protocol for Group Communication in Ad-Hoc Networks
Existing ad hoc routing protocols are either unicast or multicast. In this paper we propose a simple extension to the Dynamic Source Routing Protocol (DSR) to cater for group comm...
In Joe Khor, Johnson P. Thomas, Istvan Jonyer
GLOBECOM
2007
IEEE
14 years 2 months ago
MARS: Misbehavior Detection in Ad Hoc Networks
—To detect misbehavior on data and mitigate adverse effects, we propose and evaluate a MultipAth Routing Single path transmission (MARS) scheme. The MARS combines multipath routi...
Li Zhao, José G. Delgado-Frias
ADHOC
2007
144views more  ADHOC 2007»
13 years 8 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac