Abstract. Service discovery protocols help users of a communication network to find services, applications, and devices that are available in the network. This feature is especially useful for mobile users in foreign networks and for groups of users that form a spontaneous (ad hoc) wireless network. As the demand for service discovery is growing, security is becoming an important concern. This paper discusses security in the IETF Service Location Protocol version 2 (SLPv2). We comment on a few security leaks in SLP and propose simple modifications in the SLP specification that make the protocol more resistant against replay attacks. Our method stores the timestamps received in service registration and deregistration messages. Furthermore, w...
This paper presents three new mechanisms for the Service Location Protocol (SLP): mesh enhancement, ...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Abstract: The dynamic yet vulnerable nature of an hoc network presents many new security and privacy...
The development of low-cost, ubiquitous, wireless systems is leading to a future where location will...
Ad-hoc networking, where network structure is created dynamically as nodes enter and leave the netwo...
Ad-hoc networking, where network structure is created dynamically as nodes enter and leave the netwo...
Everybody who works within a network will sometimes be of need to access a special type of service...
Everybody who works within a network will sometimes be of need to access a special type of service...
Everybody who works within a network will sometimes be of need to access a special type of service...
Abstract — Ad-hoc networking is a promising technology for new services and applications. Ad-hoc net...
In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed netwo...
Abstract: With the growth of presence based services, it is important to securely manage and distrib...
Abstract—Technological advancements have made it possible to use information associated with a mobil...
Abstract Mobile IP enables a mobile node (MN) to move around without losing their transport-layer c...
In the Mobile IPv6 protocol, the mobile node sends binding updates to its correspondents to inform t...
This paper presents three new mechanisms for the Service Location Protocol (SLP): mesh enhancement, ...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Abstract: The dynamic yet vulnerable nature of an hoc network presents many new security and privacy...
The development of low-cost, ubiquitous, wireless systems is leading to a future where location will...
Ad-hoc networking, where network structure is created dynamically as nodes enter and leave the netwo...
Ad-hoc networking, where network structure is created dynamically as nodes enter and leave the netwo...
Everybody who works within a network will sometimes be of need to access a special type of service...
Everybody who works within a network will sometimes be of need to access a special type of service...
Everybody who works within a network will sometimes be of need to access a special type of service...
Abstract — Ad-hoc networking is a promising technology for new services and applications. Ad-hoc net...
In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed netwo...
Abstract: With the growth of presence based services, it is important to securely manage and distrib...
Abstract—Technological advancements have made it possible to use information associated with a mobil...
Abstract Mobile IP enables a mobile node (MN) to move around without losing their transport-layer c...
In the Mobile IPv6 protocol, the mobile node sends binding updates to its correspondents to inform t...
This paper presents three new mechanisms for the Service Location Protocol (SLP): mesh enhancement, ...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Abstract: The dynamic yet vulnerable nature of an hoc network presents many new security and privacy...