Sciweavers

702 search results - page 27 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
73
Voted
INFOCOM
2009
IEEE
15 years 4 months ago
RADcast: Enabling Reliability Guarantees for Content Dissemination in Ad Hoc Networks
— This paper deals with the problem of reliable and fast broadcast of mission-critical data with rich content over ad hoc networks. Existing approaches to dissemination reliabili...
Bo Xing, Sharad Mehrotra, Nalini Venkatasubramania...
74
Voted
BROADNETS
2007
IEEE
15 years 4 months ago
Goodput optimization in CSMA/CA wireless networks
—Packet based wireless networks have provided high data rates, and the desire for ubiquitous wireless computing is growing rapidly. To accommodate these demands, wireless systems...
Yusun Chang, Christopher P. Lee, John A. Copeland
MOBIQUITOUS
2007
IEEE
15 years 4 months ago
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks
— Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the trans...
Mooi Choo Chuah, Peng Yang, Jianbin Han
MASCOTS
2007
14 years 11 months ago
A Hierarchical Connected Dominating Set Based Clustering Algorithm for Mobile Ad Hoc Networks
— We propose a hierarchical Connected Dominating Set (CDS) based algorithm for clustering in Mobile Ad hoc Networks (MANETs). Our algorithm is an extension of our previous Connec...
Deniz Cokuslu, Kayhan Erciyes
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 4 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana