Sciweavers

1677 search results - page 269 / 336
» A distributed security scheme for ad hoc networks
Sort
View
COMCOM
2007
94views more  COMCOM 2007»
14 years 10 months ago
Adaptive backup routing for ad-hoc networks
The network topology changes frequently in ad-hoc networks. Some on-demand protocols with multi-paths or backup routes have been proposed to improve the performance in ad-hoc netw...
Wei Kuang Lai, Sheng-Yu Hsiao, Yuh-Chung Lin
COMCOM
2007
149views more  COMCOM 2007»
14 years 9 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
ICDCSW
2006
IEEE
15 years 4 months ago
Contory: A Smart Phone Middleware Supporting Multiple Context Provisioning Strategies
This paper presents Contory, a middleware specifically deployed to support provisioning of context information on mobile devices such as smart phones. Contory integrates multiple...
Oriana Riva, Cristiano di Flora
MOBICOM
2004
ACM
15 years 3 months ago
Detecting and correcting malicious data in VANETs
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data t...
Philippe Golle, Daniel H. Greene, Jessica Staddon
TMC
2010
109views more  TMC 2010»
14 years 8 months ago
Uncertainty Modeling and Reduction in MANETs
—Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right or wrong...
Feng Li, Jie Wu