Sciweavers

1408 search results - page 173 / 282
» Dealing with Node Mobility in Ad Hoc Wireless Network
Sort
View
GLOBECOM
2009
IEEE
15 years 1 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang
INFOCOM
2009
IEEE
15 years 4 months ago
On Leveraging Partial Paths in Partially-Connected Networks
Abstract—Mobile wireless network research focuses on scenarios at the extremes of the network connectivity continuum where the probability of all nodes being connected is either ...
Simon Heimlicher, Merkourios Karaliopoulos, Hanoch...
MOBICOM
1999
ACM
15 years 2 months ago
Analysis of TCP Performance over Mobile Ad Hoc Networks
Mobile ad hoc networks have attracted attention lately as a means of providing continuous network connectivity to mobile computing devices regardless of physical location. Recent r...
Gavin Holland, Nitin H. Vaidya
TSMC
2010
14 years 4 months ago
Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs
In mobile ad hoc networks, nodes have the inherent ability to move. Aside from conducting attacks to maximize their utility and cooperating with regular nodes to deceive them, mali...
Feng Li, Yinying Yang, Jie Wu
SEUS
2007
IEEE
15 years 4 months ago
A QoS Routing Protocol for Mobile Ad Hoc Networks Based on a Reservation Pool
Even without possible interference from external radio sources, the problem of guaranteeing quality-of-service (QoS) routing in mobile ad hoc networks (MANETs) is a difficult probl...
Donghak Pyo, Sunggu Lee, Min-Gu Lee