Sciweavers

1835 search results - page 229 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
APNOMS
2006
Springer
15 years 1 months ago
Zone-Based Clustering for Intrusion Detection Architecture in Ad-Hoc Networks
Setting up an IDS architecture on ad-hoc network is hard because it is not easy to find suitable locations to setup IDS's. One way is to divide the network into a set of clust...
Il-Yong Kim, Yoo-Sung Kim, Ki-Chang Kim
JDCTA
2010
150views more  JDCTA 2010»
14 years 4 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
NETWORKING
2008
14 years 11 months ago
XIAN Automated Management and Nano-Protocol to Design Cross-Layer Metrics for Ad Hoc Networking
In the highly dynamic and unpredictable environment of MANETs, cross-layer design is receiving growing interest but lacks experimental validation tools. This paper presents XIAN (C...
Hervé Aïache, Vania Conan, Laure Lebru...
JCP
2006
110views more  JCP 2006»
14 years 10 months ago
Gateway Selection Review in Ad hoc Networks
The nature of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance const...
Tarek Sheltami
ICC
2007
IEEE
173views Communications» more  ICC 2007»
15 years 4 months ago
Throughput-Oriented Power Control in MIMO-Based Ad Hoc Networks
— Transmission power control (TPC) has been used in wireless ad hoc networks to improve channel reuse and/or reduce energy consumption. It has been mainly applied to single-input...
Mohammad Z. Siam, Marwan Krunz