Sciweavers

738 search results - page 65 / 148
» Security considerations in ad hoc sensor networks
Sort
View
ISPA
2004
Springer
14 years 2 months ago
An Adaptive Routing Strategy Based on Dynamic Cache in Mobile Ad Hoc Networks
The dynamic changes of the topology caused by the movement of nodes makes routing become one of the key problems in the mobile Ad Hoc Networks (MANET). So how to optimize routing b...
YueQuan Chen, Xiaofeng Guo, QingKai Zeng, Guihai C...
ADHOCNOW
2006
Springer
14 years 2 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
MDM
2009
Springer
126views Communications» more  MDM 2009»
14 years 3 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
PE
2008
Springer
139views Optimization» more  PE 2008»
13 years 8 months ago
Performance optimization of region-based group key management in mobile ad hoc networks
We propose and analyze a scalable and efficient region-based group key management protocol for secure group communications in mobile ad hoc networks. For scalability and dynamic r...
Jin-Hee Cho, Ing-Ray Chen, Ding-Chau Wang
JNW
2006
149views more  JNW 2006»
13 years 8 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo