Sciweavers

1558 search results - page 44 / 312
» Mobility helps security in ad hoc networks
Sort
View
HASE
2007
IEEE
15 years 3 months ago
Development of Custom Selling System Using Ad Hoc Networks
Recently, many routing protocols and applications for mobile ad hoc networks have been proposed. However, most of them are tested through the simulation experiments, but are not d...
Masato Asada, Tomoyuki Ohta, Kenji Ishida, Yoshiak...
JSAC
2006
156views more  JSAC 2006»
14 years 11 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
ACMSE
2004
ACM
15 years 5 months ago
Recent advances in mobility modeling for mobile ad hoc network research
In this paper, we survey recent advances in mobility modeling for mobile ad hoc network research. The advances include some new mobility models and analysis of older mobility mode...
Qunwei Zheng, Xiaoyan Hong, Sibabrata Ray
SIGCSE
2005
ACM
110views Education» more  SIGCSE 2005»
15 years 5 months ago
Towards concrete concurrency: occam-pi on the LEGO mindstorms
In a world of ad-hoc networks, highly interconnected mobile devices and increasingly large supercomputer clusters, students need models of computation that help them think about d...
Christian L. Jacobsen, Matthew C. Jadud
NETWORKING
2000
15 years 1 months ago
Survivability Analysis of Ad Hoc Wireless Network Architecture
Mobile ad hoc wireless networks are generating novel interests in mobile computing. The dynamism in network topology has thrown up multifarious issues, requiring a fresh look into ...
Krishna Paul, Romit Roy Choudhury, Somprakash Band...