Sciweavers

804 search results - page 135 / 161
» Limited flooding protocol for mobile ad hoc networks
Sort
View
110
Voted
ICN
2005
Springer
15 years 6 months ago
On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, lowcost, autom...
Adrian Carlos Ferreira, Marcos Aurélio Vila...
115
Voted
CCS
2008
ACM
15 years 2 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
109
Voted
ICCCN
2007
IEEE
15 years 6 months ago
Evaluation of Mesh-Enhanced VANET Deployment Models
—While wireless vehicular ad hoc networks (VANETs) are attracting greater commercial interest, current research has not adequately captured the real-world urban constraints in VA...
Niranjan Potnis, Atulya Mahajan, Kartik Gopalan, A...
129
Voted
ESAS
2007
Springer
15 years 6 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
MOBIHOC
2003
ACM
16 years 2 days ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong