The Sybil attack in unknown port networks such as wireless is not considered tractable. A wireless node is not capable of independently differentiating the universe of real nodes f...
— The proliferation of wireless and mobile devices has fostered the demand of context aware applications, in which location is often viewed as one of the most significant context...
— In this paper we study a simple protocol utilizing two-hop cooperative diversity augmented with “automatic repeat request” (ARQ) for multi-hop ad-hoc networks. This protoco...
— This paper discusses a joint decentralized clustering and ranging algorithm for wireless ad-hoc sensor networks. Each sensor uses a random waiting timer and local criteria to d...
In this paper, we develop adaptive metrics to identify stable links in a mobile wireless networking environment based on the analysis of link durations in several different mobili...
Michael Gerharz, Christian de Waal, Matthias Frank...