Sciweavers

859 search results - page 35 / 172
» Key Establishment for General Ad Hoc Network
Sort
View
ICC
2007
IEEE
15 years 6 months ago
Detecting Node Misbehavior in Ad hoc Networks
—Ad hoc networks employ a decentralized unstructured networking model that relies on node cooperation for key network functionalities such as routing and medium access. In this p...
M. Tamer Refaei, Yanxia Rong, Luiz A. DaSilva, Hye...
GLOBECOM
2007
IEEE
15 years 6 months ago
Bridging Distributed Hash Tables in Wireless Ad-Hoc Networks
—The adaptation of structured P2P networks, i.e. Distributed Hash Tables (DHTs), to wireless ad-hoc networks has been investigated in recent years. Existing work assume all peers...
Lawrence Cheng
SASN
2006
ACM
15 years 5 months ago
Robust cooperative trust establishment for MANETs
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastr...
Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, ...
ICDCIT
2007
Springer
15 years 6 months ago
Self-stabilizing Routing Algorithms for Wireless Ad-Hoc Networks
This paper considers the problem of unicasting in wireless ad hoc networks. Unicasting is the problem of finding a route between a source and a destination and forwarding the mess...
Rohit Ashok Khot, Ravikant Poola, Kishore Kothapal...
ITCC
2005
IEEE
15 years 5 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch