Sciweavers

640 search results - page 92 / 128
» Securing Multicast Groups in Ad Hoc Networks
Sort
View
ESAS
2007
Springer
14 years 2 months ago
New Strategies for Revocation in Ad-Hoc Networks
Responding to misbehavior in ad-hoc and sensor networks is difficult. We propose new techniques for deciding when to remove nodes in a decentralized manner. Rather than blackballin...
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross...
IJNSEC
2008
132views more  IJNSEC 2008»
13 years 8 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 3 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
GLOBECOM
2007
IEEE
14 years 3 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
WWIC
2004
Springer
139views Communications» more  WWIC 2004»
14 years 2 months ago
A Scalable and Adaptive Key Management Protocol for Group Communication
Abstract. Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applic...
Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabd...