Sciweavers

3009 search results - page 108 / 602
» On Communication Security in Wireless Ad-Hoc Sensor Networks
Sort
View
NAS
2010
IEEE
14 years 12 months ago
CR: Capability Information for Routing of Wireless Ad Hoc Networks in the Real Environment
—In greedy routing, each relay node forwards the message to a neighbor (also called successor) that is closer to the destination. However, the successor candidate set (SCS) is di...
Zhen Jiang, Zhigang Li, Nong Xiao, Jie Wu
TDSC
2011
14 years 8 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
ICCSA
2009
Springer
15 years 8 months ago
On a Construction of Short Digests for Authenticating Ad Hoc Networks
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...
Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim
108
Voted
ICC
2009
IEEE
139views Communications» more  ICC 2009»
15 years 8 months ago
FRAME: An Innovative Incentive Scheme in Vehicular Networks
—Vehicular ad hoc networks (VANETs) are envisioned to provide promising applications and services. One critical deployment issue in VANETs is to motivate vehicles and their drive...
Feng Li, Jie Wu
MSWIM
2004
ACM
15 years 7 months ago
Quantile models for the threshold range for k-connectivity
This study addresses the problem of k-connectivity of a wireless multihop network consisting of randomly placed nodes with a common transmission range, by utilizing empirical regr...
Henri Koskinen