Sciweavers

1165 search results - page 5 / 233
» Secure data communication in mobile ad hoc networks
Sort
View
ICWN
2004
14 years 10 months ago
A Peer-to-Peer Approach to Asynchronous Data Dissemination in Ad Hoc Networks
Abstract--This paper presents a model for the dissemination of information in highly dynamic ad hoc networks, such as those composed of mobile communicating devices. This model rel...
Hervé Roussain, Frédéric Guid...
163
Voted
NETWORKING
2011
14 years 8 days ago
Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point
Short-range, point-to-point communications for mobile users enjoy increasing popularity, particularly with the rise in Bluetooth-equipped mobile devices. Unfortunately, virus write...
Nicholas Valler, B. Aditya Prakash, Hanghang Tong,...
DEXA
2004
Springer
115views Database» more  DEXA 2004»
15 years 2 months ago
TriM: Tri-Modal Data Communication in Mobile Ad-Hoc Networks
A Mobile Ad-Hoc Network (MANET) is a group of wireless, mobile, battery-powered clients and servers that autonomously form temporary networks. Three data communication modes can be...
Leslie D. Fife, Le Gruenwald
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 3 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
WWIC
2007
Springer
221views Communications» more  WWIC 2007»
15 years 3 months ago
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malici...
Oscar F. Gonzalez, Michael P. Howarth, George Pavl...