Sciweavers

120 search results - page 16 / 24
» Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
Sort
View
JSAC
2006
114views more  JSAC 2006»
13 years 7 months ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu
ADHOCNOW
2008
Springer
14 years 2 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
ICC
2007
IEEE
136views Communications» more  ICC 2007»
14 years 1 months ago
Reputation-Based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks
— In a mobile ad hoc network, node cooperation in packet forwarding is required for the network to function properly. However, since nodes in this network usually have limited re...
Tiranuch Anantvalee, Jie Wu
ICN
2007
Springer
14 years 1 months ago
Energy Efficiency in the Mobile Ad Hoc Networking Approach to Monitoring Farm Animals
—Using Mobile Ad Hoc Networks (MANETs) for monitoring bovine animals potentially offers high increase in the profitability of cattle production. In this paper we propose a formal...
Bartosz Wietrzyk, Milena Radenkovic
JSAC
2006
136views more  JSAC 2006»
13 years 7 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas