Sciweavers

2691 search results - page 65 / 539
» Securing Ad Hoc Networks
Sort
View
TON
2008
75views more  TON 2008»
15 years 4 months ago
An algorithmic approach to geographic routing in ad hoc and sensor networks
The one type of routing in ad hoc and sensor networks that currently appears to be most amenable to algorithmic analysis
Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger
CCS
2007
ACM
15 years 8 months ago
Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach
Defending against denial-of-service (DoS) in a mobile ad hoc network (MANET) is challenging because the network topology is dynamic and nodes are selfish. In this paper, we propos...
Xiaoxin Wu, David K. Y. Yau
WISTP
2010
Springer
15 years 11 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
ICCCN
2007
IEEE
15 years 8 months ago
Algorithms for Communication in Wireless multi-hop ad hoc Networks using Broadcasts in Opportunistic Large Arrays (OLA)
A new physical layer technique [1] for broadcasting in multi-hop wireless ad hoc networks makes broadcast a much more efficient building block than traditional flooding broadcast. ...
Edoardo S. Biagioni
DFN
2004
15 years 5 months ago
Prototype Implementation of Anycast-based Service Discovery for Mobile Ad Hoc Networks
: Mobile ad hoc networks are self-organized, and devices in such networks have to locate available services dynamically. We propose to utilize anycast for efficient service discove...
Jidong Wu, Oliver Stanze, Kilian Weniger, Martina ...