We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To …
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the mobile ad hoc networking (MANET) technology. These infrastructureless, self-organized …
MO Pervaiz, M Cardei, J Wu - Network security, 2010 - Springer
Wireless networks provide rapid, untethered access to information and computing, eliminating the barriers of distance, time, and location for many applications ranging from …
YC Hu, A Perrig, DB Johnson - Proceedings of the 8th annual …, 2002 - dl.acm.org
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Page 1 Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …
H Yih-Chun, A Perrig - IEEE Security & Privacy, 2004 - ieeexplore.ieee.org
Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Attacks on ad hoc network routing protocols disrupt network performance and …
RB Bobba, L Eschenauer, V Gligor… - GLOBECOM'03. IEEE …, 2003 - ieeexplore.ieee.org
To date, most solutions proposed for secure routing in mobile ad-hoc networks (MANETs), assume that secure associations between pairs of nodes can be established on-line; eg, by …
MG Zapata - ACM SIGMOBILE Mobile Computing and …, 2002 - dl.acm.org
This article gives an overview of different approaches to provide security features to routing protocols in mobile ad hoc networks (MANET). It also describes Secure AODV (an extension …
R Song, L Korba, G Yee - Proceedings of the 3rd ACM workshop on …, 2005 - dl.acm.org
Security, anonymity, and scalability are still important issues for mobile ad hoc network routing protocols. We first expose the limitations of several existing mobile ad hoc network …
J Cordasco, S Wetzel - Electronic Notes in Theoretical Computer Science, 2008 - Elsevier
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues into …