Sciweavers

675 search results - page 22 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
TPDS
2002
155views more  TPDS 2002»
13 years 8 months ago
Extended Dominating-Set-Based Routing in Ad Hoc Wireless Networks with Unidirectional Links
Efficient routing among a set of mobile hosts (also called nodes) is one of the most important functions in ad hoc wireless networks. Routing based on a connected dominating set is...
Jie Wu
AINA
2008
IEEE
14 years 2 months ago
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secu...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 10 hour ago
Power Allocation in Team Jamming Games in Wireless Ad Hoc Networks
In this work, we study the problem of power allocation in teams. Each team consists of two agents who try to split their available power between the tasks of communication and jam...
Sourabh Bhattacharya, Ali Khanafer, Tamer Basar
ICNP
2002
IEEE
14 years 1 months ago
Power Mode Scheduling for Ad Hoc Networks
An ad hoc network is a group of mobile wireless nodes that cooperatively form a network among themselves without any fixed infrastructure. Increasingly, power consumption within ...
Santashil PalChaudhuri, David B. Johnson