Sciweavers

123 search results - page 14 / 25
» Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Sort
View
MSWIM
2006
ACM
15 years 3 months ago
Pattern matching based link quality prediction in wireless mobile ad hoc networks
As mobile devices, such as laptops, PDAs or mobile phones, are getting more and more ubiquitous and are able to communicate with each other via wireless technologies, the paradigm...
Károly Farkas, Theus Hossmann, Lukas Ruf, B...
INFOCOM
2005
IEEE
15 years 3 months ago
HADOF: defense against routing disruptions in mobile ad hoc networks
— HADOF is a set of mechanisms to defend against routing disruptions in mobile ad hoc networks. Based on the observed behavior and the history record of each node, HADOF aims to ...
Wei Yu, Yan Sun, K. J. Ray Liu
61
Voted
IPCCC
2006
IEEE
15 years 3 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...
ADHOC
2007
133views more  ADHOC 2007»
14 years 9 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
ICWMC
2006
IEEE
15 years 3 months ago
An Ant-based Routing Protocol using Unidirectional Links for Heterogeneous Mobile Ad-Hoc Networks
Because of the heterogeneity in radio transceiver capabilities and influence of surroundings, unidirectional links arise in wireless mobile ad-hoc networks. Since most of existin...
Taro Maekawa, Harumasa Tada, Naoki Wakamiya, Makot...