Sciweavers

1498 search results - page 130 / 300
» A Process Calculus for Mobile Ad Hoc Networks
Sort
View
ICOIN
2005
Springer
14 years 1 months ago
A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks
Abstract. Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most...
Seongil Hahm, Yongjae Jung, Seunghee Yi, Yukyoung ...
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
13 years 8 months ago
Optimized on Demand Routing Protocol of Mobile Ad Hoc Network
In this paper optimization of DSR is achieved using New Link Cache structure and Source Transparent Route Maintenance Method. The new link cache effectively utilizes the memory by ...
Chinnappan Jayakumar, Chenniappan Chellappan
AINA
2004
IEEE
13 years 11 months ago
An Exercise in Constructing Secure Mobile Ad hoc Network (SMANET)
A secure MANET system, called SMANET, was developed that accepts only those packets whose MAC addresses are in the Linux iptable firewall rules. Detailed iptable set up and the pe...
C. Edward Chow, Paul J. Fong, Ganesh Godavari
WCNC
2008
IEEE
14 years 2 months ago
Mobility-Assisted Location Management for Vehicular Ad Hoc Networks
— Vehicular Ad-hoc Networks (VANETs) are gaining importance for inter-vehicle communication, because they allow for the local communication between vehicles without any infrastru...
Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou
ADHOCNOW
2006
Springer
14 years 2 months ago
Circularity-Based Medium Access Control in Mobile Ad Hoc Networks
Abstract. The RTS/CTS access scheme, designed to reduce the number of collisions in a IEEE 802.11 network, is known to exhibit problems due to masked nodes, the imbalance between t...
Mohammad Z. Ahmad, Damla Turgut, R. Bhakthavathsal...