Sciweavers

675 search results - page 36 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
MOBIHOC
2000
ACM
14 years 26 days ago
Role-based multicast in highly mobile but sparsely connected ad hoc networks
— We present an approach to multicasting messages among highly mobile hosts in ad hoc networks. We suggest a new definition of a role-based multicast that suits the special need...
Linda Briesemeister, Günter Hommel
ICCNMC
2005
Springer
14 years 2 months ago
A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks
In this paper, we propose a distributed hierarchical intrusion detection system, for ad hoc wireless networks, based on a power level metric for potential ad hoc hosts, which is us...
T. Srinivasan, Jayesh Seshadri, J. B. Siddharth Jo...
CORR
2010
Springer
282views Education» more  CORR 2010»
13 years 7 months ago
A New Approach in Packet Scheduling in the Vanet
Vehicular Ad hoc Networks (VANET) are expected to have great potential to improve both traffic safety and comfort in the future. When many vehicles want to access data through roa...
Sayadi Mohammad Javad, Fathy Mahmood
GI
2005
Springer
14 years 2 months ago
A new approach towards authenticated key agreement schemes for resource-constrained devices
: This paper describes a novel solution for authenticated key agreement for wireless sensor networks (WSN) in logistics. The retrieved data may not be spoofed as it is used to gene...
Christian Gorecki, Christian Behrens, Rainer Laur
JOIN
2006
113views more  JOIN 2006»
13 years 8 months ago
Local Detection of Selfish Routing Behavior in Ad Hoc Networks
Reputation mechanisms for detecting and punishing free-riders in ad hoc networks depend on the local detection of selfish behavior. Although naive selfish strategies based on drop...
Bo Wang 0001, Sohraab Soltani, Jonathan K. Shapiro...