Back to Results
First PageMeta Content
Computing / Ad hoc On-Demand Distance Vector Routing / Routing / IPv6 / Flooding / Dynamic Source Routing / Pastry / Wireless networking / Network architecture / OSI protocols


Secure Routing and Intrusion Detection in Ad Hoc Networks Anand Patwardhan, Jim Parker and Anupam Joshi Computer Science and Electrical Engineering Department University of Maryland at Baltimore County 1000 Hilltop Circl
Add to Reading List

Document Date: 2007-09-19 01:00:00


Open Document

File Size: 365,18 KB

Share Result on Facebook

Company

Conventional Intrusion Detection Systems / Intrusion Detection Systems / Cisco / Booz Allen Hamilton / Handheld Device Processor Memory Wireless / Intel / /

/

Event

FDA Phase / Product Issues / /

Facility

Building Neighbor / Electrical Engineering Department University of Maryland / Tom Karygiannis National Institute of Standards and Technology / /

IndustryTerm

wireless connectivity / detection-based systems / similar devices / ad-hoc networks / packet classifying routers / faster processors / personal computing devices / wireless standards / ad hoc networking environment / dense networks / routing based on network / ad hoc network / GSM / dense network / wireless interfaces / online service / real-time traffic monitoring / infrastructure-based network services / evaluation algorithms / Sensor networks / ad hoc networks / technology limitations / wireless technologies / real-time traffic / wireless ad hoc networks / secure bootstrapping algorithm / secure routing protocol / mobile devices / secure routing protocols / wireless capabilities / GPRS / particular protocol / selective processing / wireless access / adaptive distributed algorithm / wireline devices / /

OperatingSystem

Linux / /

Organization

Parker and Anupam Joshi Computer Science and Electrical Engineering Department University / National Science Foundation / Mobile Ad Hoc Network / Key Distribution Center / National Institute of Standards and Technology / University of Maryland at Baltimore / Certificate Authority / /

Person

Tom Karygiannis / Jim Parker / Michaela Iorga / Anupam Joshi / /

Position

forward data packets / co-operative / /

Product

ping6 utility / HP iPAQ Headphone/Headset / This / nodes / ping6 / IPv6 / AODV / /

ProgrammingLanguage

Perl / Hoc / /

ProvinceOrState

California / /

Technology

IPv6 The AODV protocol / IPv6 / secure association The protocol / Linux / MAC address / routing protocols / packet classifying routers / private key / Perl / mobile device / evaluation algorithms / mobile devices / encryption / Ethernet / routing protocol / adaptive distributed algorithm / public key / wireless access / finite state machine / particular protocol / secure routing protocol / wireless technologies / secure routing protocols / SDRAM / GSM / same secure bootstrapping algorithm / flash / Although encryption / base AODV protocol / /

SocialTag