Sciweavers

182 search results - page 12 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
104
Voted
ICDCS
2011
IEEE
13 years 9 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang
VTC
2007
IEEE
114views Communications» more  VTC 2007»
15 years 3 months ago
Advanced Disjoint Address Allocation for Mobile Ad Hoc Networks
—Regarding to address allocation, a mobile ad hoc network (MANET) may suffer from the lack of address and network partition/merging due to mobility of nodes. In this paper, we pr...
Jinkyu Lee, Sehoon Kim, Ikjun Yeom
ISPA
2004
Springer
15 years 2 months ago
An Adaptive Routing Strategy Based on Dynamic Cache in Mobile Ad Hoc Networks
The dynamic changes of the topology caused by the movement of nodes makes routing become one of the key problems in the mobile Ad Hoc Networks (MANET). So how to optimize routing b...
YueQuan Chen, Xiaofeng Guo, QingKai Zeng, Guihai C...
INFOCOM
2003
IEEE
15 years 2 months ago
Capacity, Delay and Mobility in Wireless Ad-Hoc Networks
Abstract— Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been show...
Nikhil Bansal, Zhen Liu
74
Voted
INFOCOM
2002
IEEE
15 years 2 months ago
Clustering Overhead for Hierarchical Routing in Mobile Ad hoc Networks
Numerous clustering algorithms have been proposed that can support routing in mobile ad hoc networks (MANETs). However, there is very little formal analysis that considers the comm...
John Sucec, Ivan Marsic