Sciweavers

182 search results - page 6 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
WCNC
2008
IEEE
15 years 3 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...
ICT
2004
Springer
127views Communications» more  ICT 2004»
15 years 2 months ago
An Interference Avoidance Technique for Ad Hoc Networks Employing Array Antennas
Array antennas have the potential to increase the capacity of wireless networks, but a distributed beamforming algorithm for maximizing the capacity in asynchronous, decentralized ...
T. Hunziker, Jacir Luiz Bordim, T. Ohira, Shinsuke...
GLOBECOM
2009
IEEE
15 years 1 months ago
Mobility-Based Clustering in VANETs Using Affinity Propagation
Abstract--The recent research in cluster-based MAC and routing schemes for Vehicle Ad Hoc Networks (VANETs) motivates the necessity for a stable VANET clustering algorithm. Due to ...
Christine Shea, Behnam Hassanabadi, Shahrokh Valae...
PIMRC
2010
IEEE
14 years 7 months ago
Self-optimizing routing in MANETs with multi-class flows
In this paper we show how game theory and Gibbs sampling techniques can be used to design a self-optimizing algorithm for minimizing end-to-end delays for all flows in a multi-clas...
Pierre Coucheney, Bruno Gaujal, Corinne Touati
ICPPW
2003
IEEE
15 years 2 months ago
Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network
The mobile ad hoc network (MANET), which is characterized by an infrastructureless architecture and multi-hop communication, has attracted a lot of attention recently. In the evol...
Yu-Chee Tseng, Jehn-Ruey Jiang, Jih-Hsin Lee