Sciweavers

182 search results - page 7 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
EWSN
2004
Springer
15 years 9 months ago
A Novel Mechanism for Routing in Highly Mobile ad hoc Sensor Networks
This paper describes a novel routing mechanism for a network of highly mobile sensor nodes that routes data over dynamically changing topologies, using only information from neares...
Jane Tateson, Ian W. Marshall
93
Voted
AINA
2006
IEEE
15 years 1 months ago
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
Due to the nature of radio transmissions, communications in wireless networks are easy to capture and analyze. Next to this, privacy enhancing techniques (PETs) proposed for wired...
Stefaan Seys, Bart Preneel
ACMSE
2006
ACM
15 years 3 months ago
Mobility models for vehicular ad hoc network simulations
: There is a growing interest in deployment and evaluation of routing protocols for Vehicular Ad-Hoc Wireless Networks (VANETs) in urban contexts. The mobility model of nodes is on...
Niranjan Potnis, Atulya Mahajan
80
Voted
CORR
2008
Springer
108views Education» more  CORR 2008»
14 years 9 months ago
Restricted Mobility Improves Delay-Throughput Trade-offs in Mobile Ad-Hoc Networks
Abstract-- In this paper, we analyze asymptotic delaythroughput trade-offs in mobile ad-hoc networks comprising heterogeneous nodes with restricted mobility. We show that node spat...
Michele Garetto, Emilio Leonardi
IPCCC
2006
IEEE
15 years 3 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...