—This paper presents an ad-hoc vehicular protocol to support the logistics of first responders. First responders often travel several kilometers to reach an area impacted by an ...
Jonathan Woodbridge, Mars Lan, Giovanni Pau, Mario...
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. Our protocol exploits the property of ad hoc networks that each membe...