Sciweavers

3009 search results - page 127 / 602
» On Communication Security in Wireless Ad-Hoc Sensor Networks
Sort
View
WS
2006
ACM
15 years 7 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
IWCMC
2009
ACM
15 years 8 months ago
Probabilistic counter-based route discovery for mobile ad hoc networks
Conventional on-demand route discovery for ad hoc routing protocols extensively use simple flooding, which could potentially lead to high channel contention, causing redundant ret...
Aminu Mohammed, Mohamed Ould-Khaoua, Lewis M. Mack...
MSWIM
2003
ACM
15 years 6 months ago
Randomized location service in mobile ad hoc networks
Mobile Ad-Hoc Networks (MANETS) are networks of mobile nodes that do not have a fixed infrastructure. Recent research in this field addresses ways of solving existing problems i...
Sangeeta Bhattacharya
INFOCOM
2010
IEEE
15 years 1 days ago
On the Age of Pseudonyms in Mobile Ad Hoc Networks
—In many envisioned mobile ad hoc networks, nodes are expected to periodically beacon to advertise their presence. In this way, they can receive messages addressed to them or par...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
INFOCOM
2010
IEEE
15 years 1 days ago
On Delay Constrained Multicast Capacity of Large-Scale Mobile Ad-Hoc Networks
—This paper studies the delay constrained multicast capacity of large scale mobile ad hoc networks (MANETs). We consider a MANET that consists of ns multicast sessions. Each mult...
Shan Zhou, Lei Ying