Sciweavers

1677 search results - page 182 / 336
» A distributed security scheme for ad hoc networks
Sort
View
DSN
2002
IEEE
15 years 3 months ago
An Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks
We consider the following problem for wireless ad hoc networks: assume n nodes, each capable of communicating with nodes within a radius of r, are distributed in a ddimensional re...
Paolo Santi, Douglas M. Blough
IWCMC
2006
ACM
15 years 4 months ago
A novel broadcast technique for high-density ad hoc networks
Broadcasting in ad hoc networks is required for many routing and other network-layer protocols to request information like routes or locations about destination nodes. Most of the...
Ai Hua Ho, Alexander J. Aved, Kien A. Hua
MOBIHOC
2004
ACM
15 years 4 months ago
A message ferrying approach for data delivery in sparse mobile ad hoc networks
Mobile Ad Hoc Networks (MANETs) provide rapidly deployable and self-configuring network capacity required in many critical applications, e.g., battlefields, disaster relief and ...
Wenrui Zhao, Mostafa H. Ammar, Ellen W. Zegura
JSAC
2006
156views more  JSAC 2006»
14 years 10 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
82
Voted
ADHOC
2007
173views more  ADHOC 2007»
14 years 10 months ago
An adaptive transmission-scheduling protocol for mobile ad hoc networks
Transmission-scheduling protocols can support contention-free link-level broadcast transmissions and delay sensitive traffic in mobile, multiple-hop packet radio networks. Use of t...
Praveen K. Appani, Joseph L. Hammond, Daniel L. No...