Sciweavers

1247 search results - page 230 / 250
» Designing Secure Wireless Mobile Ad Hoc Networks
Sort
View
ICCCN
2007
IEEE
15 years 4 months ago
Infrastructure for Cross-Layer Designs Interaction
Abstract—The current system design of mobile ad hoc networks (MANET), derived from their traditional fixed counterparts, cannot fully meet the requirements inherent to the dynam...
Zhijiang Chang, Georgi Gaydadjiev, Stamatis Vassil...
INFOCOM
2007
IEEE
15 years 4 months ago
Robust and Scalable Geographic Multicast Protocol for Mobile Ad-hoc Networks
— Group communications are important in Mobile Ad hoc Networks (MANET). Multicast is an efficient method to implement the group communications. However, it is challenging to imp...
Xiaojing Xiang, Zehua Zhou, Xin Wang
WIMOB
2007
IEEE
15 years 4 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
MOBIHOC
2008
ACM
15 years 9 months ago
Complexity in wireless scheduling: impact and tradeoffs
It has been an important research topic since 1992 to maximize stability region in constrained queueing systems, which includes the study of scheduling over wireless ad hoc networ...
Yung Yi, Alexandre Proutiere, Mung Chiang
ACMSE
2006
ACM
15 years 3 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang