Sciweavers

86 search results - page 6 / 18
» Jamming and sensing of encrypted wireless ad hoc networks
Sort
View
ICPPW
2005
IEEE
15 years 3 months ago
A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks
— In a typical mobile ad hoc network, mobile computing devices wander autonomously and communicate via temporary links in a self-organized computing system without any central ad...
Zhi Li, Yu-Kwong Kwok
IAAI
2003
14 years 11 months ago
Secure Mobile Agents on Ad Hoc Wireless Networks
This paper describes SWAT, a Secure Wireless Agent Testbed. Our goal is to create an integrated environment to study information assurance for mobile agent systems on ad hoc wirel...
Evan Sultanik, Donovan Artz, Gustave Anderson, Mos...
JDCTA
2010
150views more  JDCTA 2010»
14 years 4 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
80
Voted
MOBIHOC
2003
ACM
15 years 9 months ago
Lightweight sensing and communication protocols for target enumeration and aggregation
The development of lightweight sensing and communication protocols is a key requirement for designing resource constrained sensor networks. This paper introduces a set of efficien...
Qing Fang, Feng Zhao, Leonidas J. Guibas
ICC
2007
IEEE
175views Communications» more  ICC 2007»
15 years 4 months ago
Adaptive Range-Based Power Control for Collision Avoidance in Wireless Ad Hoc Networks
—The paper analyzes the relationships among the transmission range, carrier sensing range, and interference range in case that power control is adopted and proposes an adaptive r...
Kuei-Ping Shih, Yen-Da Chen, Chau-Chieh Chang