Sciweavers

353 search results - page 21 / 71
» Securing Distance-Vector Routing Protocols
Sort
View
WS
2003
ACM
14 years 2 months ago
Rushing attacks and defense in wireless ad hoc network routing protocols
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many ...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
VISUALIZATION
2002
IEEE
14 years 2 months ago
Case Study: Interactive Visualization for Internet Security
Internet connectivity is defined by a set of routing protocols which let the routers that comprise the Internet backbone choose the best route for a packet to reach its destinati...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Xia...
WISEC
2009
ACM
14 years 4 months ago
An attacker model for MANET routing security
Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a so...
Jared Cordasco, Susanne Wetzel
MSN
2005
Springer
251views Sensor Networks» more  MSN 2005»
14 years 3 months ago
ZBMRP: A Zone Based Multicast Routing Protocol for Mobile Ad Hoc Networks
In this paper, we propose a Multicast Routing Protocol termed ZBMRP (Zone Based Multicast Routing Protocol) for Mobile Ad Hoc Networks (MANETs). ZBMRP applies on-demand procedures ...
Jieying Zhou, Simeng Wang, Jing Deng, Hongda Feng
PERCOM
2005
ACM
14 years 9 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...