Sciweavers

1247 search results - page 33 / 250
» Designing Secure Wireless Mobile Ad Hoc Networks
Sort
View
MSWIM
2006
ACM
15 years 3 months ago
The effect of the radio wave propagation model in mobile ad hoc networks
The simulation of wireless networks has been an important tool for researchers and the industry in the last years. Especially in the field of Mobile Ad Hoc Networking, most curre...
Arne Schmitz, Martin Wenig
WS
2005
ACM
15 years 3 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
AINA
2007
IEEE
14 years 11 months ago
Secure Mobile Ad hoc Routing
In mobile ad hoc networks (MANETs), multi-hop message relay is the common way for nodes to communicate and participate in network operations, making routing a primary issue. The e...
Xu Li, Amiya Nayak, Isabelle Ryl, David Simplot, I...
MOBIHOC
2002
ACM
15 years 9 months ago
Message-optimal connected dominating sets in mobile ad hoc networks
A connected dominating set (CDS) for a graph G(V, E) is a subset V of V , such that each node in V - V is adjacent to some node in V , and V induces a connected subgraph. A CDS ha...
Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder
WISTP
2009
Springer
15 years 4 months ago
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks
Olivier Heen, Gilles Guette, Thomas Genet