Sciweavers

775 search results - page 89 / 155
» Secure Service Provision in Ad Hoc Networks
Sort
View
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
15 years 6 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
MASCOTS
2007
15 years 5 months ago
A Hierarchical Connected Dominating Set Based Clustering Algorithm for Mobile Ad Hoc Networks
— We propose a hierarchical Connected Dominating Set (CDS) based algorithm for clustering in Mobile Ad hoc Networks (MANETs). Our algorithm is an extension of our previous Connec...
Deniz Cokuslu, Kayhan Erciyes
LCN
2006
IEEE
15 years 10 months ago
Data Aggregation System for Distributing Inter-Vehicle Warning Messages
The use of ad hoc networking technology in the automotive environment enables new promising services, mainly providing information to the driver increasing vehicle safety. This wi...
Stephan Eichler, Christian Merkle, Markus Strassbe...
BROADNETS
2006
IEEE
15 years 10 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...
ESAS
2007
Springer
15 years 10 months ago
New Strategies for Revocation in Ad-Hoc Networks
Responding to misbehavior in ad-hoc and sensor networks is difficult. We propose new techniques for deciding when to remove nodes in a decentralized manner. Rather than blackballin...
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross...