Sciweavers

1624 search results - page 27 / 325
» Requirements for Privacy-Enhancements in Mobile Ad Hoc Netwo...
Sort
View
145
Voted
ISCC
2005
IEEE
162views Communications» more  ISCC 2005»
15 years 6 months ago
A JXTA Compliant Framework for Mobile Handheld Devices in Ad Hoc Networks
The availability of powerful personal computers and high bandwidth home connectivity is changing the way users cooperate and exchange information on the network. Peer to peer comp...
Mario Bisignano, Giuseppe Di Modica, Orazio Tomarc...
WCNC
2008
IEEE
15 years 7 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...
ADHOC
2005
122views more  ADHOC 2005»
15 years 17 days ago
Maintaining weakly-connected dominating sets for clustering ad hoc networks
An ad hoc network is a multihop wireless communication network supporting mobile users. Network performance degradation is a major problem as the network becomes larger. Clusterin...
Yuanzhu Peter Chen, Arthur L. Liestman
91
Voted
VTC
2007
IEEE
15 years 7 months ago
Mobility-Aware Data Management on Mobile Wireless Networks
— We design a Mobility-aware DAta management (MoDA) scheme for mobile ad hoc networks (MANETs) composed by mobile nodes such as urban pedestrians and vehicles. By fully utilizing...
Akiko Yamasaki, Hirozumi Yamaguchi, Shinji Kusumot...
100
Voted
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 7 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana