Sciweavers

2691 search results - page 56 / 539
» Securing Ad Hoc Networks
Sort
View
TCOM
2011
183views more  TCOM 2011»
14 years 6 months ago
Multi-Antenna Communication in Ad Hoc Networks: Achieving MIMO Gains with SIMO Transmission
—The benefit of multi-antenna receivers is investigated in wireless ad hoc networks, and the main finding is that network throughput can be made to scale linearly with the numb...
Nihar Jindal, Jeffrey G. Andrews, Steven Weber
SAINT
2003
IEEE
15 years 5 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
ICWN
2004
15 years 1 months ago
Sustaining Performance Under Traffic Overload
In this paper, we investigate the performance of wireless ad hoc networks with traffic loads beyond saturation. While it is desirable to operate a network below saturation, an ad h...
Saman Desilva, Rajendra V. Boppana
RAID
2004
Springer
15 years 5 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee