Sciweavers

766 search results - page 145 / 154
» Securing Ad hoc Routing Protocols
Sort
View
77
Voted
ADHOC
2007
104views more  ADHOC 2007»
14 years 11 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
APSCC
2008
IEEE
15 years 5 months ago
Access Gateway Discovery and Selection in Hybrid Multihop Relay Vehicular Network
—Vehicular ad hoc network protocol with hybrid relay architecture is proposed for improving the success ratio. Access gateway estimation and a probability table based on the rout...
Shang-Pin Sheng, Ben-Yue Chang, Hung-Yu Wei
JSAC
2006
101views more  JSAC 2006»
14 years 11 months ago
Distributed space-time coding for multihop transmission in power line communication networks
In this paper, we consider transmission in relatively wide-stretched power line communication (PLC) networks, where repeaters are required to bridge the source-to-destination dista...
Lutz H.-J. Lampe, Robert Schober, Simon Yiu
ESAS
2006
Springer
15 years 2 months ago
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protoco...
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, ...
GLOBECOM
2008
IEEE
15 years 5 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren