Sciweavers

675 search results - page 39 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
ESAS
2005
Springer
14 years 2 months ago
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks
Abstract. In this paper, we propose a framework for the security analysis of on-demand, distance vector routing protocols for ad hoc networks, such as AODV, SAODV, and ARAN. The pr...
Gergely Ács, Levente Buttyán, Istv&a...
PADS
2004
ACM
14 years 1 months ago
Detailed OFDM Modeling in Network Simulation of Mobile Ad Hoc Networks
In mobile ad hoc network (MANET) studies, it is imperative to use highly detailed device models as they provide high layer protocols with good prediction of underlying wireless co...
Gavin Yeung, Mineo Takai, Rajive Bagrodia, Alireza...
ESAS
2007
Springer
14 years 2 months ago
Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
Abstract. Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central t...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
EWSN
2006
Springer
14 years 8 months ago
Constraint-Based Distance Estimation in Ad-Hoc Wireless Sensor Networks
Abstract. We propose a lightweight localisation approach for supporting distance and range queries in ad hoc wireless sensor networks. In contrast to most previous localisation app...
Urs Bischoff, Martin Strohbach, Mike Hazas, Gerd K...
WOWMOM
2005
ACM
240views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer Networks
Ad hoc networks represent a key factor in the evolution of wireless communications. These networks typically consist of equal nodes that communicate without central control, inter...
Luca Gatani, Giuseppe Lo Re, Salvatore Gaglio