Sciweavers

TWC
2008
95views more  TWC 2008»
13 years 4 months ago
The Impact of Channel Randomness on Coverage and Connectivity of Ad Hoc and Sensor Networks
Abstract-- In this paper, we first present an analytical procedure for the computation of the node isolation probability and coverage in an ad hoc network in the presence of channe...
Daniele Miorandi
ADHOC
2004
100views more  ADHOC 2004»
13 years 4 months ago
Position and orientation in ad hoc networks
Position and orientation information of individual nodes in ad hoc networks is useful for both service and application implementation. Services that can be enabled by availability...
Dragos Niculescu, Badri Nath
JSAC
2006
156views more  JSAC 2006»
13 years 4 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
JOIN
2006
113views more  JOIN 2006»
13 years 4 months ago
Local Detection of Selfish Routing Behavior in Ad Hoc Networks
Reputation mechanisms for detecting and punishing free-riders in ad hoc networks depend on the local detection of selfish behavior. Although naive selfish strategies based on drop...
Bo Wang 0001, Sohraab Soltani, Jonathan K. Shapiro...
JCS
2006
116views more  JCS 2006»
13 years 4 months ago
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. Our protocol exploits the property of ad hoc networks that each membe...
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jaj...
JSAC
2008
157views more  JSAC 2008»
13 years 4 months ago
Spectrum Leasing to Cooperating Secondary Ad Hoc Networks
Abstract--The concept of cognitive radio (or secondary spectrum access) is currently under investigation as a promising paradigm to achieve efficient use of the frequency resource ...
Osvaldo Simeone, Igor Stanojev, Stefano Savazzi, Y...
CORR
2008
Springer
90views Education» more  CORR 2008»
13 years 4 months ago
Dynamic Connectivity in ALOHA Ad Hoc Networks
We consider an ad hoc network which uses multihop routing and slotted ALOHA for its MAC contention. We show that the minimum time required for a packet to reach the destination fr...
Radha Krishna Ganti, Martin Haenggi
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 4 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
CORR
2008
Springer
101views Education» more  CORR 2008»
13 years 4 months ago
Cognitive networks achieve throughput scaling of a homogeneous network
We study two distinct, but overlapping, networks which operate at the same time, space and frequency. The first network consists of
Sang-Woon Jeon, Natasha Devroye, Mai Vu, Sae-Young...
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 4 months ago
Reputation-Based Attack-Resistant Cooperation Stimulation (RACS) For Mobile Ad hoc Networks
In mobile ad hoc networks (MANET), nodes usually belong to different authorities and pursue different goals. In order to maximize their own performance, nodes in such networks ten...
Anuradha Banerjee, Paramartha Dutta