Sciweavers

749 search results - page 58 / 150
» CDMA-based MAC protocol for wireless ad hoc networks
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
JPDC
2006
187views more  JPDC 2006»
14 years 10 months ago
On constructing k-connected k-dominating set in wireless ad hoc and sensor networks
An important problem in wireless ad hoc and sensor networks is to select a few nodes to form a virtual backbone that supports routing and other tasks such as area monitoring. Prev...
Fei Dai, Jie Wu
BROADNETS
2004
IEEE
15 years 1 months ago
MOAR: A Multi-Channel Opportunistic Auto-Rate Media Access Protocol for Ad Hoc Networks
The IEEE 802.11 wireless media standard supports multiple frequency channels as well as multiple data rates at the physical (PHY) layer. Moreover, various auto rate adaptation mec...
Vikram Kanodia, Ashutosh Sabharwal, Edward W. Knig...
ICC
2007
IEEE
173views Communications» more  ICC 2007»
15 years 4 months ago
Using Incompletely Cooperative Game Theory in Mobile Ad Hoc Networks
—Recently, game theory becomes a useful and powerful tool to research mobile ad hoc networks (MANETs). Wireless LANs (WLANs) can work under both infrastructure and ad hoc modes, ...
Liqiang Zhao, Jie Zhang, Kun Yang, Hailin Zhang
SASN
2003
ACM
15 years 3 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras