• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 17
Next 10 →

SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks

by Yih-Chun Hu, David B. Johnson, Adrian Perrig , 2003
"... An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous ad hoc network routing protocols have been based in part on distance vec ..."
Abstract - Cited by 534 (8 self) - Add to MetaCart
operations in the protocol. SEAD performs well over the range of scenarios we tested, and is robust against multiple uncoordinated attackers creating incorrect routing state in any other node, even in spite of any active attackers or compromised nodes in the network.

From STEM to SEAD: Speculative Execution for Automated Defense

by Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis - In USENIX Annual Technical Conference. USENIX , 2007
"... Most computer defense systems crash the process that they protect as part of their response to an attack. Although recent research explores the feasibility of selfhealing to automatically recover from an attack, selfhealing faces some obstacles before it can protect legacy applications and COTS (Com ..."
Abstract - Cited by 18 (1 self) - Add to MetaCart
to provide practical speculative execution for automated defense (SEAD). First, STEM is now applicable to COTS software: it does not require source code, and it imposes a roughly 73 % performance penalty on Apache’s normal operation. Second, we introduce repair policy to assist the healing process

I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks

by Wei-shen Lai, Chu-hsing Lin, Jung-chun Liu, Yen-lin Huang, Mei-chun Chou
"... Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of a centralized access point. Secure Efficient Ad hoc Distance Vector (SEAD) is a proactive routing protocol, based on the design of Destination Sequenced Distance Vector r ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of a centralized access point. Secure Efficient Ad hoc Distance Vector (SEAD) is a proactive routing protocol, based on the design of Destination Sequenced Distance Vector

A Novel method to Detect Black Hole attack in MANET using Efficient ACO Strategy for SEAD Protocol

by Thamil Selvi C. P
"... It is highly essential to ensure security for data transmission. Number of such work is going on to ensure secure data transmission. Due to the high growth usage of mobile in this era, it is highly essential to make use of secure mechanism in mobile. Besides the advent growth of mobile there is also ..."
Abstract - Add to MetaCart
there is also a parallel growth of threats. In order to provide better performance in the mobile architecture this work ensures security for mobile nodes. Every Mobile node is liable to attack. Such nodes were declared as malicious node. This work will provide efficient strategy to fight against threats like

Performance Investigation and Analysis of Secured MANET Routing Protocols

by A. Jayan, Prof. Dr. T. Jebarajan
"... Abstract — In this research proposal, we present attacks against routing in ad hoc networks, and we present the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne. Ariadne prevents attackers or compromised nodes from tampering with uncompromis ..."
Abstract - Add to MetaCart
Abstract — In this research proposal, we present attacks against routing in ad hoc networks, and we present the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne. Ariadne prevents attackers or compromised nodes from tampering

An Intelligent Agent for Supervisory Control of Teams of unihabited Combat Air Vehicles (UCAVs)

by Dr. Mark, Mark L. Hanson, Karen A Harper , 2000
"... This paper describes a decision aid called OLIPSA (On-Line Intelligent Processor for Situation Awareness), which was originally developed for advanced fighter aircraft cockpit displays, but has recently been extended to supervisory control of UCAVs performing Suppression of Enemy Air Defense (SEAD) ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
This paper describes a decision aid called OLIPSA (On-Line Intelligent Processor for Situation Awareness), which was originally developed for advanced fighter aircraft cockpit displays, but has recently been extended to supervisory control of UCAVs performing Suppression of Enemy Air Defense (SEAD

Scenario Based Performance Evaluation of Secure Routing in MANETs,” 3rd presentation

by Karthik Sadasivam, Vishal Changrani, T. Andrew Yang - 2nd International Workshop on Mobile Ad Hoc Networks and Interoperability Issues (MANETII’05), in conjunction with the International Conference on Wireless Networks (ICWN’05), Las Vegas, NV , 2005
"... Security in MANETs is of prime importance in several scenarios of deployment such as battlefield, event coverage, etc. The traditional non-secure routing protocols for MANETs fail to prevent against attacks such as DoS, spoofing and cache poisoning. One of the primary goals of designing secure routi ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
routing protocols is to prevent the compromised nodes in the network from disrupting the route discovery and maintenance mechanisms. However, this added security comes at the cost of performance. In this paper we evaluate the performance of SEAD, a secure routing protocol based upon the proactive DSDV

Evaluation of QoS Metrics in Ad Hoc Networks with the use of Secure Routing Protocols

by Darlan Vivian, Eduardo Adilio, Pelinson Alchieri, Carlos Becker Westphall
"... An Ad Hoc network is formed by mobile computers (nodes) with wireless interfaces that communicate amongst themselves without the help of any infrastructure. Due to their characteristics, the Ad Hoc networks are prone to the presence of malicious nodes that can degrade your performance. This fact mot ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
motivated the appearance of security protocols that implement mechanisms to avoid attacks like DoS. In this article is accomplished a verification the impact caused in the performance of the Ad Hoc networks with the use of security protocols (SEAD and Ariadne) in relation to the use of protocols that don

Comparing secure routing protocols

by Sarika S
"... Abstract- Security has gained a lot of importance in mobile ad-hoc network. It is difficult to design secure ad hoc network routing protocols due to the highly dynamic nature of adhoc network and due to the need to operate efficiently with limited resources. This paper presents a performance compari ..."
Abstract - Add to MetaCart
comparison of various secure routing protocols named SAODV,SEAD and SDART.These protocols provide security to different routing protocols such as AODV,DSDV and DART.The simulation results are done in order to choose the best secure routing protocol to give the highest performance when implement the secure

SECURING ROUTE DISCOVERY IN MAODV FOR WIRELESS SENSOR NETWORKS

by R. Shyamala* Dr. S. Valli
"... The deployment of sensor networks for security and safety related environments requires securing communication primitives such as broadcast, multicast and point to point communication. Recent research shows that multicast provides high energy saving in IP supported wireless sensor networks (WSN). I ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
). In this work, we investigate how to secure route discovery of the Multicast Ad-hoc on Demand Distance Vector (MAODV) protocol for WSNs. For the ad-hoc networks ARIADNE, SEAD, ARAN are some of the solutions, which cannot be directly applied to energy constrained WSNs. Here, we propose a secure route discovery
Next 10 →
Results 1 - 10 of 17
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University