Sciweavers

3009 search results - page 99 / 602
» On Communication Security in Wireless Ad-Hoc Sensor Networks
Sort
View
MDM
2004
Springer
130views Communications» more  MDM 2004»
15 years 6 months ago
Opportunistic Resource Exchange in Inter-Vehicle Ad-Hoc Networks
In this paper we examine resource discovery in inter-vehicle ad-hoc networks in an urban area, where moving vehicles communicate with each other via short-range wireless transmiss...
Bo Xu, Aris M. Ouksel, Ouri Wolfson
MOBIHOC
2004
ACM
16 years 1 months ago
Localized algorithms for energy efficient topology in wireless ad hoc networks
We propose several novel localized algorithms to construct energy efficient routing structures for homogeneous wireless ad hoc networks, where all nodes have same maximum transmis...
Wen-Zhan Song, Yu Wang 0003, Xiang-Yang Li
161
Voted
JDCTA
2010
150views more  JDCTA 2010»
14 years 8 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
ADHOC
2006
87views more  ADHOC 2006»
15 years 1 months ago
Medium Access Control protocols for ad hoc wireless networks: A survey
Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols a...
Sunil Kumar, Vineet S. Raghavan, Jing Deng
ESAS
2007
Springer
15 years 7 months ago
New Strategies for Revocation in Ad-Hoc Networks
Responding to misbehavior in ad-hoc and sensor networks is difficult. We propose new techniques for deciding when to remove nodes in a decentralized manner. Rather than blackballin...
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross...