Sciweavers

832 search results - page 88 / 167
» Secure Node Discovery in Ad-hoc Networks and Applications
Sort
View
MOBICOM
2009
ACM
15 years 5 months ago
Neighbor discovery in wireless networks and the coupon collector's problem
—Neighbor discovery1 is one of the first steps in the initialization of a wireless ad hoc network. In this paper, we design and analyze practical algorithms for neighbor discove...
Sudarshan Vasudevan, Donald F. Towsley, Dennis Goe...
ACSAC
1998
IEEE
15 years 3 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
BROADNETS
2007
IEEE
15 years 5 months ago
Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution
— A Mobile Ad-Hoc Network (MANET) is considered with nodes that may act selfishly or maliciously by simply dropping data packets rather than forwarding them. We study a distribu...
Arnab Das 0002, George Kesidis, Venkat Pothamsetty
LCN
2003
IEEE
15 years 4 months ago
Reliable Multipath Routing with Fixed Delays in MANET Using Regenerating Nodes
This paper proposes a new framework in mobile ad hoc networks (MANET) for reliable multipath routing with fixed delays based on packet level Forward Error Control (FEC). The nove...
Rui Ma, Jacek Ilow
ICN
2005
Springer
15 years 4 months ago
On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, lowcost, autom...
Adrian Carlos Ferreira, Marcos Aurélio Vila...