Sciweavers

3009 search results - page 37 / 602
» On Communication Security in Wireless Ad-Hoc Sensor Networks
Sort
View
MOBIHOC
2001
ACM
16 years 28 days ago
Time synchronization in ad hoc networks
Ubiquitous computing environments are typically based upon ad hoc networks of mobile computing devices. These devices may be equipped with sensor hardware to sense the physical en...
Kay Römer
CORR
2010
Springer
183views Education» more  CORR 2010»
15 years 1 months ago
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks
-- In cluster-based routing protocol (CBRP), two-level hierarchical structure is successfully used to reduce over-flooding in wireless ad hoc networks. As it is vulnerable to a sin...
Alok Ojha, Hongmei Deng, Dharma P. Agrawal, Sugata...
INFOCOM
2005
IEEE
15 years 7 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...
ICC
2007
IEEE
118views Communications» more  ICC 2007»
15 years 7 months ago
A Confident Community to Secure Mobile Ad Hoc Networks
Abderrezak Rachedi, Abderrahim Benslimane, Lei Gua...
DIALM
2003
ACM
133views Algorithms» more  DIALM 2003»
15 years 6 months ago
Ad-hoc networks beyond unit disk graphs
In this paper, we study an algorithmic model for wireless ad hoc and sensor networks that aims to be sufficiently close to reality as to represent practical realworld networks whi...
Fabian Kuhn, Aaron Zollinger