Sciweavers

675 search results - page 16 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
PEWASUN
2004
ACM
14 years 1 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
IFIP
2004
Springer
14 years 1 months ago
Ad Hoc Routing with Early Unidirectionality Detection and Avoidance
This paper is motivated by the observation that current research in ad hoc networks mostly assumes a physically flat network architecture with the nodes having homogeneous charact...
Young-Bae Ko, Sung-Ju Lee, Jun-Beom Lee
VTC
2010
IEEE
128views Communications» more  VTC 2010»
13 years 6 months ago
Performance of Underwater Ad-Hoc Networks
Abstract— We consider the performance of underwater acoustic ad-hoc networks. We assume a uniform distribution of the nodes over a finite area. The node-to-node channel is model...
Andrej Stefanov, Milica Stojanovic
MOBIHOC
2005
ACM
14 years 8 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
IJAHUC
2010
130views more  IJAHUC 2010»
13 years 7 months ago
Secure traffic data propagation in Vehicular Ad Hoc Networks
: In vehicular ad hoc network, vehicles can share traffic/emergency information. The information should not be modified/manipulated during transmission without detection. We pres...
Baber Aslam, Soyoung Park, Cliff Changchun Zou, Da...