Sciweavers

1373 search results - page 35 / 275
» Self-securing ad hoc wireless networks
Sort
View
INFOCOM
2003
IEEE
14 years 25 days ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
PEWASUN
2004
ACM
14 years 1 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
ADHOCNOW
2009
Springer
13 years 5 months ago
A Decentralized Approach to Minimum-Energy Broadcasting in Static Ad Hoc Networks
Broadcasting is a commonly used feature in wireless networking, e.g. for file distribution, re-tasking, event notification, or miscellaneous maintenance. Due to the limited resourc...
Christopher Miller, Christian Poellabauer
INFOCOM
2010
IEEE
13 years 6 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
GLOBECOM
2008
IEEE
14 years 2 months ago
Adjustable Transmission Power in Wireless Ad Hoc Networks with Smart Antennas
—In this paper, we present a model to analyze the performance of wireless ad hoc networks with smart antennas, i.e. directional antennas with adjustable transmission power. Our r...
Fei Huang, Victor O. K. Li, Ka-Cheong Leung