Sciweavers

1835 search results - page 182 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
JNW
2006
68views more  JNW 2006»
14 years 10 months ago
Quick Local Repair Scheme using Adaptive Promiscuous Mode in Mobile Ad Hoc Networks
In mobile ad hoc networks (MANETs), there is frequently disconnected a route consisting of multi-hop from a source to a destination because of the dynamic nature such as the topolo...
Joo Sang Youn, Jihoon Lee, Doo-Hyun Sung, Chul-Hee...
APNOMS
2006
Springer
15 years 2 months ago
Path Hopping Based on Reverse AODV for Security
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
Elmurod Talipov, Donxue Jin, JaeYoun Jung, Ilkhyu ...
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
15 years 4 months ago
Secure Dynamic Source Routing
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
ICASSP
2011
IEEE
14 years 2 months ago
Interference alignment in clustered ad hoc networks: High reliability regime and per-cluster aloha
Wireless networks are fundamentally limited by the intensity of the received signals and the mutual interference caused by many concurrent transmissions. We consider large wireles...
Roland Tresch, Giusi Alfano, Maxime Guillaud
92
Voted
PERCOM
2007
ACM
15 years 10 months ago
A Cooperative MAC Protocol for Ad Hoc Wireless Networks
Cooperative communications fully leverages the broadcast nature of the wireless channel and spatial diversity, thereby achieving tremendous improvements in system capacity and dela...
Thanasis Korakis, Zhifeng Tao, Yevgeniy Slutskiy, ...