Sciweavers

576 search results - page 81 / 116
» Overview the Key Management in Ad Hoc Networks
Sort
View
IJSN
2007
120views more  IJSN 2007»
14 years 11 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...
IPPS
2005
IEEE
15 years 5 months ago
Maximizing the Lifetime of Dominating Sets
We investigate the problem of maximizing the lifetime of wireless ad hoc and sensor networks. Being battery powered, nodes in such networks have to perform their intended task und...
Thomas Moscibroda, Roger Wattenhofer
INFOCOM
2006
IEEE
15 years 5 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras
GLOBECOM
2006
IEEE
15 years 5 months ago
Adaptive Network Resource Management in IEEE 802.11 Wireless Random Access MAC
— Effective and efficient management of wireless network resources is attracting more and more research attention, due to the rapid growing deployment of wireless mesh and ad hoc...
Hao Wang, Changcheng Huang, James Yan
128
Voted
ENTCS
2007
131views more  ENTCS 2007»
14 years 11 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo