S Bouam, J Ben-Othman - 14th IEEE Proceedings on Personal …, 2003 - ieeexplore.ieee.org
In this paper, we introduce a solution for securing data in ad hoc networks. We exploit the existence of multiple paths between nodes in an ad hoc network to increase the robustness …
We propose and investigate the SPREAD scheme as a complementary mechanism to enhance secure data delivery in a mobile ad hoc network. The basic idea is to transform a …
W Lou, Y Fang - … for Network-Centric Operations: Creating the …, 2001 - ieeexplore.ieee.org
In this paper, we propose a novel approach to enhance data confidentiality when transmitting across insecure networks. The idea is to take advantage of the distributed …
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly …
MO Pervaiz, M Cardei, J Wu - Network security, 2010 - Springer
Wireless networks provide rapid, untethered access to information and computing, eliminating the barriers of distance, time, and location for many applications ranging from …
In this paper we present a survey of secure ad hoc routing protocols for mobile wireless networks. A mobile ad hoc network is a collection of nodes that is connected through a …
We present a scheme for secure and privacy-preserving communication in hybrid ad hoc networks. Our scheme enables users to secure communication and to protect their …
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To …
So far, research on mobile ad hoc networks has been forcused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an …