Sciweavers

1558 search results - page 39 / 312
» Mobility helps security in ad hoc networks
Sort
View
ICC
2000
IEEE
241views Communications» more  ICC 2000»
15 years 4 months ago
Power Management for Throughput Enhancement in Wireless Ad-Hoc Networks
—In this paper we introduce the notion of power management within the context of wireless ad-hoc networks. More specifically, we investigate the effects of using different trans...
Tamer A. ElBatt, Srikanth V. Krishnamurthy, Dennis...
INFOCOM
2007
IEEE
15 years 6 months ago
To Repair or Not To Repair: Helping Ad-hoc Routing Protocols to Distinguish Mobility from Congestion
Abstract—In this paper we consider the problem of distinguishing whether frame loss at the MAC layer has occurred due to mobility or congestion. Most ad hoc routing protocols mak...
Manoj Pandey, Roger Pack, Lei Wang, Qiuyi Duan, Da...
ICWN
2004
15 years 1 months ago
Securing Data Transmissions and Retransmissions Management in Ad Hoc Networks
We present in this paper a solution exploiting existence of multiple paths between nodes to secure data in Ad hoc networks. This solution is also designed in the aim to give the ne...
Souheila Bouam, Jalel Ben-Othman
CORR
2008
Springer
143views Education» more  CORR 2008»
14 years 12 months ago
On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks
In this paper, a reliability analysis is carried out to state a performance comparison between two recently proposed proactive routing algorithms. These protocols are able to scale...
Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paur...
WISTP
2010
Springer
15 years 6 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe