Sciweavers

645 search results - page 99 / 129
» Interest-Based Lookup Protocols for Mobile Ad Hoc Networks
Sort
View
JSAC
2006
156views more  JSAC 2006»
14 years 9 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
MOBICOM
2006
ACM
15 years 3 months ago
Component based channel assignment in single radio, multi-channel ad hoc networks
In this paper, we consider the channel assignment problem in single radio multi-channel mobile ad-hoc networks. Specifically, we investigate the granularity of channel assignment...
Ramanuja Vedantham, Sandeep Kakumanu, Sriram Laksh...
89
Voted
TPDS
2008
133views more  TPDS 2008»
14 years 9 months ago
Mutual Anonymity for Mobile P2P Systems
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communication and resource sharing patterns in unfixed network infrastructures. As priv...
Jinsong Han, Yunhao Liu
ICICS
2004
Springer
15 years 3 months ago
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
MASS
2010
248views Communications» more  MASS 2010»
14 years 7 months ago
Adaptive exploitation of cooperative relay for high performance communications in MIMO ad hoc networks
With the popularity of wireless devices and the increase of computing and storage resources, there are increasing interests in supporting mobile computing techniques. Particularly...
Shan Chu, Xin Wang