Sciweavers

353 search results - page 6 / 71
» Securing Distance-Vector Routing Protocols
Sort
View
ICCCN
2007
IEEE
14 years 1 months ago
Safeguarding Mutable Fields in AODV Route Discovery Process
— Assuring cryptographic integrity of mutable fields in any on-demand ad hoc routing protocol is more challenging than that of non mutable fields. We propose an efficient auth...
Kulasekaran A. Sivakumar, Mahalingam Ramkumar
ICCCN
1998
IEEE
13 years 11 months ago
Comparative Performance Evaluation of Routing Protocols for Mobile, Ad hoc
We evaluate several routing protocols for mobile, wireless, ad hoc networks via packet level simulations. The protocol suite includes routing protocols specifically designed for a...
Samir Ranjan Das, Robert Castañeda, Jiangta...
SASN
2003
ACM
14 years 18 days ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
ICC
2007
IEEE
14 years 1 months ago
On-Demand Routing in LEO Satellite Systems
—In this paper, a location-assisted on-demand routing (LAOR) protocol for low earth orbit (LEO) satellite systems is proposed and evaluated. This protocol can be viewed as a vari...
Stylianos Karapantazis, Evangelos Papapetrou, Foti...
TPHOL
2000
IEEE
13 years 11 months ago
Routing Information Protocol in HOL/SPIN
We provide a proof using HOL and SPIN of convergence for the Routing Information Protocol (RIP), an internet protocol based on distance vector routing. We also calculate a sharp re...
Karthikeyan Bhargavan, Carl A. Gunter, Davor Obrad...