Sciweavers

1174 search results - page 166 / 235
» Whirlpool routing for mobility
Sort
View
GIS
2006
ACM
14 years 9 months ago
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desir...
Chi-Yin Chow, Mohamed F. Mokbel, Xuan Liu
AINA
2007
IEEE
15 years 1 months ago
A Protocol for Macro Mobility and Multihoming Notification in Wireless Mesh Networks
Wireless mesh networks are cost-efficient means to provide ubiquitous Internet access. For building large-scale wireless mesh networks, multiple access networks are joined together...
Rainer Baumann, Olga Bondareva, Simon Heimlicher, ...
INFOCOM
2003
IEEE
15 years 3 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
APNOMS
2006
Springer
15 years 1 months ago
NETSAQ: Network State Adaptive QoS Provisioning for MANETs
The provision of ubiquitous services in Mobile Ad-hoc Networks (MANETs) is a great challenge, considering the bandwidth, mobility, and computational-resources constraints exhibited...
Shafique Ahmad Chaudhry, Faysal Adeem Siddiqui, Al...
MOBIHOC
2007
ACM
15 years 9 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...