Sciweavers

1835 search results - page 46 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
IWSOS
2009
Springer
15 years 4 months ago
Revisiting P2P Content Sharing in Wireless Ad Hoc Networks
Classical content sharing applications like BitTorrent are not designed to run over wireless networks. When adapting them to these constrained networks, two main problems arise. On...
Mohamed Karim Sbai, Chadi Barakat
PERCOM
2006
ACM
14 years 9 months ago
Bootstrapping Chord in Ad Hoc Networks: Not Going Anywhere for a While.
With the growing prevalence of wireless devices, infrastructure-less ad hoc networking is coming closer to reality. Research in this field has mainly been concerned with routing. ...
Curt Cramer, Thomas Fuhrmann
IJSNET
2007
91views more  IJSNET 2007»
14 years 9 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
MOBIHOC
2001
ACM
15 years 9 months ago
Effects of wireless physical layer modeling in mobile ad hoc networks
In most studies on mobile ad hoc networks (MANET), simulation models are used for the evaluation of devices and protocols. Typically, such simulations focus on the specific higher...
Mineo Takai, Jay Martin, Rajive Bagrodia
COMSUR
2006
96views more  COMSUR 2006»
14 years 9 months ago
A survey of multipoint relay based broadcast schemes in wireless ad hoc networks
Almost every routing protocol in mobile ad hoc networks (MANETs) depends on a broadcast scheme to disseminate routing information. For this reason, creating an efficient broadcast...
Ou Liang, Y. Ahmet Sekercioglu, Nallasamy Mani