Sciweavers

547 search results - page 78 / 110
» Analysis of a mobile communication security protocol
Sort
View
VTC
2007
IEEE
129views Communications» more  VTC 2007»
15 years 8 months ago
Cross-Layer Partner-Based Fast Handoff Mechanism for IEEE 802.11 Wireless Networks
Abstract— In this paper, we propose a cross-layer partnerbased fast handoff mechanism based on HMIPv6, called as PHMIPv6 protocol. Our PHMIPv6 protocol is a cross-layer, layer-2 ...
Yuh-Shyan Chen, Wei-Han Hsiao, Kau-Lin Chiu
INFOCOM
2010
IEEE
15 years 5 days ago
Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System
— In multi-hop wireless networks, the mobile nodes usually act as routers to relay packets generated from other nodes. However, selfish nodes do not cooperate but make use of the...
Mohamed Elsalih Mahmoud, Xuemin Shen
ICC
2008
IEEE
159views Communications» more  ICC 2008»
15 years 8 months ago
A Performance Study of Mobile Handoff Delay in IEEE 802.11-Based Wireless Mesh Networks
— Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. One important component of realizing large-...
Akshay Mangalam Srivatsa, Jiang Xie
GLOBECOM
2007
IEEE
15 years 3 months ago
Route Optimization for Large Scale Network Mobility Assisted by BGP
—This paper presents a novel scheme that enables IPv6 mobile networks to perform optimal route optimization. The proposed scheme exploits features of the widely deployed border g...
Feriel Mimoune, Farid Naït-Abdesselam, Tarik ...
MOBIHOC
2007
ACM
16 years 1 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...