Sciweavers

1835 search results - page 148 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
113
Voted
TMC
2012
13 years 1 months ago
A Statistical Mechanics-Based Framework to Analyze Ad Hoc Networks with Random Access
—Characterizing the performance of ad hoc networks is one of the most intricate open challenges; conventional ideas based on information-theoretic techniques and inequalities hav...
Sunil Srinivasa, Martin Haenggi
SUTC
2006
IEEE
15 years 4 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
115
Voted
ISCC
2002
IEEE
169views Communications» more  ISCC 2002»
15 years 3 months ago
Congestion controlled adaptive lightweight multicast in wireless mobile ad hoc networks
The use of contention-based MAC protocols combined with hidden terminal problems make multi-hop wireless ad hoc networks much more sensitive to load and congestion than wired netw...
Ken Tang, Katia Obraczka, Sung-Ju Lee, Mario Gerla
126
Voted
ICWN
2010
14 years 8 months ago
Detecting and Labelling Wireless Community Network Structures from Eigen-spectra
Wireless and ad hoc networks often have local regions of highly intra-connected modules or communities of nodes against a backdrop of sparser longer-range intercommunity connectiv...
Ken A. Hawick
INFOCOM
2002
IEEE
15 years 3 months ago
Gossip-based ad hoc routing
— Many ad hoc routing protocols are based on (some variant of) flooding. Despite various optimizations, many routing messages are propagated unnecessarily. We propose a gossipin...
Zygmunt J. Haas, Joseph Y. Halpern, Erran L. Li