Sciweavers

1389 search results - page 135 / 278
» Model-based compression in wireless ad hoc networks
Sort
View
JSAC
2006
156views more  JSAC 2006»
14 years 10 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
ADHOCNOW
2006
Springer
15 years 4 months ago
Initialization for Ad Hoc Radio Networks with Carrier Sensing and Collision Detection
We consider an ad-hoc network consisting of devices that try to gain access for transmission through a shared communication channel. We redesign randomized protocol of Cai, Lu and ...
Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada
ADHOCNOW
2004
Springer
15 years 3 months ago
Routing Table Dynamics in Mobile Ad-Hoc Networks: A Continuum Model
Abstract. This paper gives a simple continuum model for generic proactive routing protocols in a mobile ad-hoc network. Rate constants characterize the routing protocol and the net...
Ernst W. Grundke
109
Voted
MOBIHOC
2002
ACM
15 years 10 months ago
Comparison of broadcasting techniques for mobile ad hoc networks
Network wide broadcasting in Mobile Ad Hoc Networks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering i...
Brad Williams, Tracy Camp
SASN
2003
ACM
15 years 3 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras