Sciweavers

804 search results - page 135 / 161
» Limited flooding protocol for mobile ad hoc networks
Sort
View
ICN
2005
Springer
15 years 4 months ago
On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, lowcost, autom...
Adrian Carlos Ferreira, Marcos Aurélio Vila...
CCS
2008
ACM
15 years 16 days ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
ICCCN
2007
IEEE
15 years 4 months ago
Evaluation of Mesh-Enhanced VANET Deployment Models
—While wireless vehicular ad hoc networks (VANETs) are attracting greater commercial interest, current research has not adequately captured the real-world urban constraints in VA...
Niranjan Potnis, Atulya Mahajan, Kartik Gopalan, A...
ESAS
2007
Springer
15 years 4 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
MOBIHOC
2003
ACM
15 years 10 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong