Sciweavers

1558 search results - page 286 / 312
» Mobility helps security in ad hoc networks
Sort
View
CONEXT
2007
ACM
15 years 3 months ago
BonSwing: A GUI framework for ad-hoc applications using service discovery
In typical single-link 802.11 ad-hoc networks, devices often move from one network to the next, forming transitory associations without a fixed support infrastructure. The state i...
Suman Srinivasan, Henning Schulzrinne
WIMOB
2008
IEEE
15 years 6 months ago
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
— Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubiquitous computing environments. Understanding how to efficiently and effect...
Greg Bigwood, D. Rehunathan, Martin Bateman, Trist...
WICOMM
2008
139views more  WICOMM 2008»
14 years 11 months ago
Struggling against selfishness and black hole attacks in MANETs
Since mobile ad hoc networks (MANETs) are infrastructureless and multi-hop by nature, transmitting packets from any node to another usually relies on services provided by intermed...
Djamel Djenouri, Nadjib Badache
IJCSA
2007
130views more  IJCSA 2007»
14 years 11 months ago
Purposeful Deployment via Self-Organizing Flocking Coalition in Sensor Networks
This paper presents a deployment strategy via self organizing flocking coalitions for mobile sensor network coverage. The concepts of our approach are inspired by the flocking phe...
Yee Ming Chen, Shu-Hao Chang
GLOBECOM
2008
IEEE
15 years 6 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren