Sciweavers

2691 search results - page 89 / 539
» Securing Ad Hoc Networks
Sort
View
ICPADS
2006
IEEE
15 years 10 months ago
Incentive Compatible Cost- and Stability-Based Routing in Ad Hoc Networks
In this paper, we embed an incentive-compatible, efficient, and individual rational payment scheme into our cost- and stability-based routing protocol in ad hoc networks which co...
Mingming Lu, Feng Li, Jie Wu
TIT
2002
148views more  TIT 2002»
15 years 4 months ago
The use of multiuser detectors for multicasting in wireless ad hoc CDMA networks
In this paper, we address the issue of performance of linear multiuser detectors for a multicasting application in an ad hoc wireless network. Using a code-division multiple-access...
Chandrasekar Sankaran, Anthony Ephremides
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
16 years 4 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 8 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
PEWASUN
2004
ACM
15 years 9 months ago
A routing protocol for power constrained networks with asymmetric links
In many instances, an ad hoc network consists of nodes with different hardware and software capabilities as well as power limitations. This is the case of ad hoc grids where devi...
Guoqiang Wang, Yongchang Ji, Dan C. Marinescu, Dam...