Sciweavers

170 search results - page 24 / 34
» Using a two-timer scheme to detect selfish nodes in mobile a...
Sort
View
ESAS
2007
Springer
14 years 1 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
13 years 7 months ago
Optimized on Demand Routing Protocol of Mobile Ad Hoc Network
In this paper optimization of DSR is achieved using New Link Cache structure and Source Transparent Route Maintenance Method. The new link cache effectively utilizes the memory by ...
Chinnappan Jayakumar, Chenniappan Chellappan
ADHOCNOW
2009
Springer
13 years 8 months ago
An Efficient and Scalable Address Autoconfiguration in Mobile Ad Hoc Networks
Several protocols of address autoconfiguration in the mobile ad hoc network (MANET) are present in the current literature. Although some of these protocols perform decently in spar...
Syed Rafiul Hussain, Subrata Saha, Ashikur Rahman
CCS
2007
ACM
13 years 11 months ago
Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach
Defending against denial-of-service (DoS) in a mobile ad hoc network (MANET) is challenging because the network topology is dynamic and nodes are selfish. In this paper, we propos...
Xiaoxin Wu, David K. Y. Yau
MASS
2010
150views Communications» more  MASS 2010»
13 years 5 months ago
A non-replication multicasting scheme in delay tolerant networks
Delay tolerant networks (DTNs) are a special type of wireless mobile networks which may lack continuous network connectivity. Multicast is an important routing function that suppor...
Jie Wu, Yunsheng Wang