Sciweavers

1624 search results - page 60 / 325
» Requirements for Privacy-Enhancements in Mobile Ad Hoc Netwo...
Sort
View
111
Voted
TRIDENTCOM
2005
IEEE
15 years 6 months ago
A Testbed and Methodology for Experimental Evaluation of Wireless Mobile Ad hoc Networks
Wireless mobile ad hoc network experimentation is subjected to stochastic factors from the radio environment and node mobility. To achieve test repeatability and result reproducib...
Erik Nordström, Per Gunningberg, Henrik Lundg...
137
Voted
JSAC
2006
156views more  JSAC 2006»
15 years 21 days ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
MUM
2006
ACM
181views Multimedia» more  MUM 2006»
15 years 6 months ago
Cross-layer design for providing service oriented architecture in a mobile Ad Hoc network
This paper presents a novel cross-layer design for providing service oriented architecture (SOA) in a mobile ad hoc network (MANET). In the design SOA service discovery is integra...
Tommi Halonen, Timo Ojala
166
Voted
PE
2006
Springer
193views Optimization» more  PE 2006»
15 years 21 days ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
109
Voted
ADHOCNOW
2005
Springer
15 years 6 months ago
Location Tracking in Mobile Ad Hoc Networks Using Particle Filters
Mobile ad hoc networks (MANET) are dynamic networks formed on-the-fly as mobile nodes move in and out of each others’ transmission ranges. In general, the mobile ad hoc networki...
Rui Huang, Gergely V. Záruba