Sciweavers

640 search results - page 90 / 128
» Securing Multicast Groups in Ad Hoc Networks
Sort
View
MDM
2007
Springer
148views Communications» more  MDM 2007»
14 years 2 months ago
Enforcing Data Integrity in Very Large Ad Hoc Networks
Ad hoc networks rely on nodes forwarding each other’s packets, making trust and cooperation key issues for ensuring network performance. As long as all nodes in the network belo...
Daniela Gavidia, Maarten van Steen
GLOBECOM
2006
IEEE
14 years 2 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
ICCHP
2004
Springer
14 years 2 months ago
proXimity: Ad-Hoc Networks for Enhanced Mobility
David tries not to use unfamiliar trains and buses, he doesn’t travel to places he doesn’t know, and he doesn’t travel in unusual environments without a companion. David is v...
Simon Harper, Stephen Pettitt, Carole A. Goble
JSAC
2006
111views more  JSAC 2006»
13 years 8 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
JDCTA
2010
150views more  JDCTA 2010»
13 years 3 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao