Sciweavers

675 search results - page 19 / 135
» A Norm-Governed Systems Perspective of Ad Hoc Networks
Sort
View
INFOCOM
2003
IEEE
15 years 7 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
CIA
2007
Springer
15 years 8 months ago
From Local Search to Global Behavior: Ad Hoc Network Example
We introduce the Consensual N-Player Prisoner’s Dilemma as a large-scale dilemma. We then present a framework for cooperative consensus formation in large-scale MAS under the N-P...
Osher Yadgar
GLOBECOM
2008
IEEE
15 years 8 months ago
Antenna Selection Diversity Based MAC Protocol for MIMO Ad Hoc Wireless Networks
— In this paper, we propose a novel asynchronous Media Access Control (MAC) protocol, Opportunistic MAC (OMAC), for Multiple Input Multiple Output (MIMO) ad-hoc networks. The pro...
Abhijeet Bhorkar, B. S. Manoj, Bhaskar D. Rao, Ram...
MOBIHOC
2000
ACM
15 years 6 months ago
Role-based multicast in highly mobile but sparsely connected ad hoc networks
— We present an approach to multicasting messages among highly mobile hosts in ad hoc networks. We suggest a new definition of a role-based multicast that suits the special need...
Linda Briesemeister, Günter Hommel
INFOCOM
2003
IEEE
15 years 7 months ago
On the Capacity of Hybrid Wireless Networks
— We study the throughput capacity of hybrid wireless networks. A hybrid network is formed by placing a sparse network of base stations in an ad hoc network. These base stations ...
Benyuan Liu, Zhen Liu, Donald F. Towsley