Sciweavers

85 search results - page 14 / 17
» Distance Hijacking Attacks on Distance Bounding Protocols
Sort
View
ICDCS
2003
IEEE
15 years 5 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
MOBIHOC
2001
ACM
15 years 11 months ago
Geometric spanner for routing in mobile networks
We propose a new routing graph, the Restricted Delaunay Graph (RDG), for ad hoc networks. Combined with a node clustering algorithm, RDG can be used as an underlying graph for geo...
Jie Gao, Leonidas J. Guibas, John Hershberger, Li ...
ADHOC
2007
139views more  ADHOC 2007»
14 years 11 months ago
Bounded-distance multi-clusterhead formation in wireless ad hoc networks
We present a clustering technique addressing redundancy for bounded-distance clusters, which means being able to determine the minimum number of cluster-heads per node, and the ma...
Marco Aurélio Spohn, J. J. Garcia-Luna-Acev...
WCNC
2008
IEEE
15 years 6 months ago
A Novel Capacity Analysis for Wireless Backhaul Mesh Networks
—This paper presents a novel ring-based approach to analyze the inter-flow capacity of a backhaul wireless mesh networks (WMNs) with centralized scheduling. Based on the property...
Tein-Yaw D. Chung, Kuan-Chun Lee, Hsiao-Chih Georg...
MOBIHOC
2004
ACM
15 years 11 months ago
Error characteristics of ad hoc positioning systems (aps)
APS algorithms use the basic idea of distance vector routing to find positions in an ad hoc network using only a fraction of landmarks, for example GPS enabled nodes. All the node...
Dragos Niculescu, Badri Nath