Sciweavers

367 search results - page 51 / 74
» Fuzzy Location Service for Mobile Ad Hoc Networks
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 1 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
WISEC
2009
ACM
15 years 6 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
GLOBECOM
2010
IEEE
14 years 9 months ago
Energy-Aware Real-Time Opportunistic Routing for Wireless Ad Hoc Networks
Existing studies on the design of routing protocols for wireless ad hoc networks mainly focused on energy efficiency. However, in many real-time applications such as target trackin...
Wei Yang, Weifa Liang, Wenhua Dou
GLOBECOM
2010
IEEE
14 years 9 months ago
Risk-Aware Response for Mitigating MANET Routing Attacks
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received co...
Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu
NETWORK
2007
187views more  NETWORK 2007»
14 years 11 months ago
Cooperative and opportunistic transmission for wireless ad hoc networks
Moving toward 4G, wireless ad hoc networks receive growing interest due to users’ provisioning of mobility, usability of services, and seamless communications. In ad hoc network...
Qian Zhang, Qing Chen, Fan Yang, Xuemin Shen, Zhis...