Sciweavers

859 search results - page 47 / 172
» Key Establishment for General Ad Hoc Network
Sort
View
MOBIHOC
2005
ACM
15 years 11 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
GLOBECOM
2007
IEEE
15 years 6 months ago
Stability of Hierarchical Mobile Ad Hoc Networks
Abstract—In hierarchical mobile ad hoc networks, the architectual stability is a key factor in determining the network performance. There are many solutions proposed to construct...
Yi Xu, Wenye Wang
WIOPT
2010
IEEE
14 years 10 months ago
Optimal monotone forwarding policies in delay tolerant mobile ad hoc networks with multiple classes of nodes
—In this paper we describe a framework for the optimal control of delay tolerant mobile ad hoc networks where multiple classes of nodes co-exist. We specialize the description of...
Francesco De Pellegrini, Eitan Altman, Tamer Basar
WD
2010
14 years 9 months ago
Sender- and receiver-centered interference in wireless ad hoc networks
Energy consumption in general and interference in particular are among the most critical issues in wireless networks. In this paper we present the E-BUM calculus, a Energy-aware ca...
Lucia Gallina, Sabina Rossi
IFIP
2003
Springer
15 years 5 months ago
A Probabilistic Topology Unaware TDMA Medium Access Control Policy for Ad Hoc Environments
The design of an efficient Medium Access Control (MAC) is challenging in ad-hoc networks where users can enter, leave or move inside the network without any need for prior configu...
Konstantinos Oikonomou, Ioannis Stavrakakis