Sciweavers

472 search results - page 65 / 95
» The security of vehicular ad hoc networks
Sort
View
100
Voted
CISS
2008
IEEE
15 years 7 months ago
Optimizing redundancy using MDS codes and dynamic symbol allocation in mobile ad hoc networks
—We consider the design of a network in which packet transmissions between two nodes are to be guaranteed a certain probability of success. There are N independent paths between ...
Anna Kacewicz, Stephen B. Wicker
122
Voted
NETWORKING
2008
15 years 2 months ago
Resilience to Dropping Nodes in Mobile Ad Hoc Networks with Link-State Routing
Currently emerging standard routing protocols for MANETs do not perform well in presence of malicious nodes that intentionally drop data traffic but otherwise behave correctly with...
Ignacy Gawedzki, Khaldoun Al Agha
146
Voted
IEEEIAS
2008
IEEE
15 years 7 months ago
A Friend Mechanism for Mobile Ad Hoc Networks
: In the autonomous environment of mobile ad hoc network (MANET) where nodes are free to move around and depend on each other to initiate communication, cooperation among nodes is ...
Shukor Abd Razak, Normalia Samian, Mohd Aizaini Ma...
99
Voted
ICC
2007
IEEE
354views Communications» more  ICC 2007»
15 years 6 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen
116
Voted
WD
2010
14 years 10 months ago
Content Centric Networking in tactical and emergency MANETs
Abstract--Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless...
Soon-Young Oh, Davide Lau, Mario Gerla