Sciweavers

1165 search results - page 53 / 233
» Secure data communication in mobile ad hoc networks
Sort
View
VTC
2008
IEEE
114views Communications» more  VTC 2008»
15 years 6 months ago
Improving Ad Hoc Networks Capacity and Connectivity Using Dynamic Blind Beamforming
— We propose a dynamic blind beamforming scheme which allows to benefit from antenna directivity in large mobile ad hoc networks while avoiding heavy feedback to track mobile no...
Nadia Fawaz, Zafer Beyaztas, David Gesbert, M&eacu...
MOBIHOC
2005
ACM
15 years 11 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
JSAC
2006
156views more  JSAC 2006»
14 years 11 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
ICDCS
2003
IEEE
15 years 5 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
ICC
2009
IEEE
170views Communications» more  ICC 2009»
15 years 6 months ago
Transmission Capacity of Two-Way Communication in Wireless Ad Hoc Networks
—Wireless ad hoc networks require bidirectional data transmission to support two-way traffic and control functions like packet acknowledgement. Most prior work on the capacity o...
Kien T. Truong, Steven Weber, Robert W. Heath Jr.