Sciweavers

257 search results - page 24 / 52
» A Secure Data Transmission Scheme for Mobile Ad Hoc Networks
Sort
View
AINTEC
2006
Springer
13 years 11 months ago
Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Networks
Abstract. Proactive routing protocols for mobile ad hoc networks currently offer few mechanisms to detect and/or counter malevolent nodes. Stability and performance of most, if not...
Ignacy Gawedzki, Khaldoun Al Agha
PERCOM
2005
ACM
14 years 7 months ago
Anonymous Content Sharing in Ad Hoc Networks
It may be costly for mobile pervasive computing device users to download content from the Internet using their 3G connections if the 3G connection cost is a function of the amount...
Seung-Seok Kang, Matt W. Mutka, Li Xiao
SAC
2002
ACM
13 years 7 months ago
A mobility and traffic generation framework for modeling and simulating ad hoc communication networks
We present a generic mobility and traffic generation framework that can be incorporated into a tool for modeling and simulating large scale ad hoc networks. Three components of thi...
Christopher L. Barrett, Madhav V. Marathe, James P...
ACSAC
2004
IEEE
13 years 11 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
WOWMOM
2005
ACM
139views Multimedia» more  WOWMOM 2005»
14 years 29 days ago
An Agile Approach to Distributed Information Dissemination in Mobile Ad Hoc Networks
In order to ease the challenging task of information dissemination in a MANET, we employ a legend: a data structure passed around a network to share information with all the mobil...
Nicholas Bauer, Michael Colagrosso, Tracy Camp