Sciweavers

640 search results - page 51 / 128
» Securing Multicast Groups in Ad Hoc Networks
Sort
View
ISSADS
2005
Springer
14 years 2 months ago
Overview the Key Management in Ad Hoc Networks
The aim of this paper is to show some solutions for key management in ad hoc networks. The major problem in providing security services in such infrastructure less networks is how...
Gerardo del Valle, Roberto Gómez Cár...
CN
2002
87views more  CN 2002»
13 years 8 months ago
Resource management in energy-limited, bandwidth-limited, transceiver-limited wireless networks for session-based multicasting
In this paper we consider source-initiated multicast session traffic in an ad hoc wireless network, operating under hard constraints on the available transmission energy as well a...
Jeffrey E. Wieselthier, Gam D. Nguyen, Anthony Eph...
LCN
2005
IEEE
14 years 2 months ago
Secure Content Delivery using Key Composition
In this paper, we propose a novel framework for secure multicast on overlay networks. Our contributions are threefold: 1) a technique key composition is proposed to cope with the ...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Hann...
INFOCOM
2003
IEEE
14 years 2 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
CSI
2008
113views more  CSI 2008»
13 years 8 months ago
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
VANETs have the potential to dramatically increase road safety by giving drivers more time to react adequately to dangerous situations. To prevent abuse of VANETs, a security infra...
Klaus Plößl, Hannes Federrath