Sciweavers

1382 search results - page 260 / 277
» Detecting Node Misbehavior in Ad hoc Networks
Sort
View
ESAS
2006
Springer
15 years 5 months ago
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protoco...
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, ...
ICIP
2002
IEEE
16 years 3 months ago
SPIN-IT: a data centric routing protocol for image retrieval in wireless networks
In this paper, we propose and analyze a routing protocol for mobile ad hoc networks that supports efficient image retrieval based on metadata queries. In digital photography, meta...
Edward Woodrow, Wendi Rabiner Heinzelman
VTC
2006
IEEE
111views Communications» more  VTC 2006»
15 years 8 months ago
Distributed Stochastic Power and Rate Allocation for Energy Minimization in Wireless Sensor Networks
— In this paper, we propose a distributed stochastic algorithm for power and rate allocation in ad hoc wireless sensor networks. The problem we deal with is formulated as a trans...
Chun-Hung Liu, Ari Arapostathis
JSAC
2011
176views more  JSAC 2011»
14 years 9 months ago
Cross-Layer Routing Using Cooperative Transmission in Vehicular Ad-hoc Networks
Wireless vehicular ad hoc networks are characterized by multi-hop transmission, where a key problem is the design of routing, e.g., how to efficiently direct the information flo...
Zhiguo Ding, Kin K. Leung
CISIS
2008
IEEE
15 years 4 months ago
Simplified Bluetooth Scatternet Formation Using Maximal Independent Sets
Bluetooth standard allows the creation of piconets, with one node serving as its master and up to seven nodes serving as slaves. A Bluetooth ad hoc network can also be formed by in...
Nejib Zaguia, Ivan Stojmenovic, Yassine Daadaa