Sciweavers

1394 search results - page 55 / 279
» Wireless Ad Hoc Podcasting
Sort
View
GLOBECOM
2006
IEEE
15 years 5 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
WOWMOM
2006
ACM
135views Multimedia» more  WOWMOM 2006»
15 years 5 months ago
A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks
RTS-CTS handshake based protocols achieve “reliable unicast” by eliminating the hidden node problem effectively, however, these solutions are not directly or efficiently gene...
Murat Demirbas, Muzammil Hussain
INFOCOM
2005
IEEE
15 years 5 months ago
Power assignment for k-connectivity in wireless ad hoc networks
— The problem Min-Power k-Connectivity seeks a power assignment to the nodes in a given wireless ad hoc network such that the produced network topology is k-connected and the tot...
Xiaohua Jia, Dongsoo Kim, Sam Makki, Peng-Jun Wan,...
MSN
2005
Springer
114views Sensor Networks» more  MSN 2005»
15 years 5 months ago
A Directional Antenna Based Path Optimization Scheme for Wireless Ad Hoc Networks
Using directional antennas in wireless ad hoc networks is an attractive issue due to its potential advantages such as spatial reuse, low power consumption and low chance of interfe...
Sung-Ho Kim, Young-Bae Ko
LCN
2003
IEEE
15 years 5 months ago
Strategies for Finding Stable Paths in Mobile Wireless Ad Hoc Networks
In this paper, we introduce statistical methods to estimate the stability of paths in a mobile wireless ad hoc environment. Identifying stable paths helps to reduce control traf...
Michael Gerharz, Christian de Waal, Peter Martini,...