Sciweavers

3009 search results - page 18 / 602
» On Communication Security in Wireless Ad-Hoc Sensor Networks
Sort
View
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
15 years 8 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
ADHOC
2008
146views more  ADHOC 2008»
15 years 1 months ago
A secure group key management scheme for hierarchical mobile ad hoc networks
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to improve both scalability and survivability of group ke...
Dijiang Huang, Deep Medhi
PERCOM
2007
ACM
16 years 27 days ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
WINET
2010
133views more  WINET 2010»
14 years 11 months ago
Connectivity of ad hoc wireless networks: an alternative to graph-theoretic approaches
Connectivity in wireless ad hoc and sensor networks is typically analyzed using a graph-theoretic approach. In this paper, we investigate an alternative communication-theoretic app...
Sooksan Panichpapiboon, Gian Luigi Ferrari, Ozan K...
PERVASIVE
2004
Springer
15 years 6 months ago
A Distributed Precision Based Localization Algorithm for Ad-Hoc Networks
In this paper we introduce a new distributed algorithm for location discovery. It can be used in wireless ad-hoc sensor networks that are equipped with means of measuring the dista...
Leon Evers, Stefan Dulman, Paul J. M. Havinga